Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Cybersecurity Risks of Cooperative Ramp Merging in Mixed Traffic Environments., , , , and . IEEE Intell. Transp. Syst. Mag., 14 (6): 52-65 (2022)Secure Ramp Merging using Blockchain., , and . IV, page 401-408. IEEE, (2021)Application level attacks on Connected Vehicle Protocols., , , , , and . RAID, page 459-471. USENIX Association, (2019)Orphan Drug Legislation with Data Fusion Rules Using Multiple Fingerprints Measurements., , , , , and . IBICA, volume 303 of Advances in Intelligent Systems and Computing, page 261-270. Springer, (2014)Evaluating Cybersecurity Risks of Cooperative Ramp Merging in Mixed Traffic Environments., , , , and . CoRR, (2021)Secure Automated and Autonomous Systems. University of California, Riverside, USA, (2022)Securing Connected Vehicle Applications with an Efficient Dual Cyber- Physical Blockchain Framework., , , , and . IV, page 393-400. IEEE, (2021)CVGuard: Mitigating Application Attacks on Connected Vehicles., , , and . IV, page 623-630. IEEE, (2022)Cybersecurity on Connected and Automated Transportation Systems: A Survey., , , , and . IEEE Trans. Intell. Veh., 9 (1): 1382-1401 (January 2024)5G and Satellite Network Convergence: Survey for Opportunities, Challenges and Enabler Technologies., , , , , and . NILES, page 366-373. IEEE, (2020)