Author of the publication

Formal approach to thwart against drone discovery attacks: A taxonomy of novel 3D obfuscation mechanisms.

, , , and . Future Gener. Comput. Syst., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems., , , , , , and . J. Medical Syst., 43 (11): 324:1-324:18 (2019)IoTRiskAnalyzer: A Probabilistic Model Checking Based Framework for Formal Risk Analytics of the Internet of Things., , , and . IEEE Access, (2017)Cyber Regulatory Networks: Towards a Bio-inspired Auto-resilient Framework for Cyber-Defense., , and . BICT, volume 289 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 156-174. Springer, (2019)On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions., , and . PeerJ Comput. Sci., (2021)Think Before Your LFSRs Jump., , and . CIT, page 1070-1074. IEEE Computer Society, (2010)IoTChecker: A data-driven framework for security analytics of Internet of Things configurations., , , and . Comput. Secur., (2017)Leveraging the Internet of Things for Smart Waters: Motivation, Enabling Technologies and Deployment Strategies for Pakistan., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 2117-2124. IEEE, (2018)xUAVs: Towards Efficient Approximate Computing for UAVs - Low Power Approximate Adders With Single LUT Delay for FPGA-Based Aerial Imaging Optimization., , , and . IEEE Access, (2020)Formal approach to thwart against drone discovery attacks: A taxonomy of novel 3D obfuscation mechanisms., , , and . Future Gener. Comput. Syst., (2021)Where to Kill the Cyber Kill-Chain: An Ontology-Driven Framework for IoT Security Analytics., and . FIT, page 23-28. IEEE Computer Society, (2016)