Author of the publication

Performance Evaluation of Cyber-Physical Intrusion Detection on a Robotic Vehicle.

, , and . CIT/IUCC/DASC/PICom, page 2106-2113. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Denial of Service Attacks with Bayesian Classifiers and the Random Neural Network., , and . FUZZ-IEEE, page 1-6. IEEE, (2007)Behaviour-Based Anomaly Detection of Cyber-Physical Attacks on a Robotic Vehicle., , , and . IUCC-CSS, page 61-68. IEEE Computer Society, (2016)A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles., , , , , and . Ad Hoc Networks, (2019)Towards Web Usage Attribution via Graph Community Detection in Grouped Internet Connection Records., , , and . iThings/GreenCom/CPSCom/SmartData, page 365-372. IEEE Computer Society, (2017)Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective., , , , , , and . ICMR, page 404-407. ACM, (2019)A taxonomy of cyber-physical threats and impact in the smart home., , , , , , and . Comput. Secur., (2018)Dynamic decision support for resource offloading in heterogeneous Internet of Things environments., , , , and . Simul. Model. Pract. Theory, (2020)A Prototype Framework for Assessing Information Provenance in Decentralised Social Media: The EUNOMIA Concept., , , , and . e-Democracy, volume 1111 of Communications in Computer and Information Science, page 196-208. Springer, (2019)A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality., , , , , , and . IEEE Access, (2019)Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications., , , , , , and . IEEE Access, (2018)