Author of the publication

Formal approach to thwart against drone discovery attacks: A taxonomy of novel 3D obfuscation mechanisms.

, , , and . Future Gener. Comput. Syst., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications., , , , and . Ann. des Télécommunications, 78 (3-4): 183-208 (April 2023)SeFACED: Semantic-Based Forensic Analysis and Classification of E-Mail Data Using Deep Learning., , , , , and . IEEE Access, (2021)WhatsApp Network Forensics: Discovering the IP Addresses of Suspects., , , , and . NTMS, page 1-7. IEEE, (2021)A Server Based ASR Approach to Automated Cryptanalysis of Two Time Pads in Case of Speech., and . IAS, page 103-107. IEEE Computer Society, (2008)Random fixed point theorems for composites of acyclic multifunctions. Stochastic Analysis and Applications, 19 (6): 925--931 (2001)Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks., , , , and . NTMS, page 1-7. IEEE, (2021)Forensic Analysis of the Cisco WebEx Application., , , , and . CSNet, page 90-97. IEEE, (2021)Speaker recognition from encrypted VoIP communications., , and . Digital Investigation, 7 (1-2): 65-73 (2010)Speaker verification from partially encrypted compressed speech for forensic investigation., , and . Digit. Investig., 7 (1-2): 74-80 (2010)Exploiting Silence for Ciphertext Only Cryptanalysis of Stream Ciphered Digitized Voice., , and . Security and Management, page 157-164. CSREA Press, (2007)