Author of the publication

Practical DoS Attacks on Embedded Networks in Commercial Vehicles.

, , , , and . ICISS, volume 10063 of Lecture Notes in Computer Science, page 23-42. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"Kn0w Thy Doma1n Name": Unbiased Phishing Detection Using Domain Name Based Features., , and . SACMAT, page 69-75. ACM, (2018)A novel multilayer AAA model for integrated applications., , and . Neural Comput. Appl., 29 (10): 887-901 (2018)Seeing Should Probably Not Be Believing: The Role of Deceptive Support in COVID-19 Misinformation on Twitter., , , , and . ACM J. Data Inf. Qual., 15 (1): 9:1-9:26 (March 2023)The intrinsic dimensionality of network datasets and its applications., , , and . J. Comput. Secur., 31 (6): 679-704 (2023)IoTSense: Behavioral Fingerprinting of IoT Devices., , , , , and . CoRR, (2018)Towards Resiliency of Heavy Vehicles through Compromised Sensor Data Reconstruction., , , and . CODASPY, page 276-287. ACM, (2022)Machine Learning-Based Phishing Detection Using URL Features: A Comprehensive Review., , and . SSS, volume 14310 of Lecture Notes in Computer Science, page 481-497. Springer, (2023)Cross-Silo Federated Learning Across Divergent Domains with Iterative Parameter Alignment., , and . IEEE Big Data, page 5233-5242. IEEE, (2023)On the Performance of Isolation Forest and Multi Layer Perceptron for Anomaly Detection in Industrial Control Systems Networks., , and . IOTSMS, page 1-6. IEEE, (2021)Adversarial Sampling Attacks Against Phishing Detection., , , and . DBSec, volume 11559 of Lecture Notes in Computer Science, page 83-101. Springer, (2019)