Author of the publication

Secure Attack Detection Framework for Hierarchical 6G-Enabled Internet of Vehicles.

, , , and . IEEE Trans. Veh. Technol., 73 (2): 2633-2642 (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of an Algorithm for Cardiac Pathologies Detection on Mobile Phone., , and . Int. J. Wirel. Inf. Networks, 18 (1): 11-23 (2011)Incentive edge caching in software-defined internet of vehicles: A Stackelberg game approach., , , and . Int. J. Commun. Syst., (2019)An efficient cyber defense framework for UAV-Edge computing network., , , and . Ad Hoc Networks, (2019)A new intrusion detection approach against lethal attacks in the smart grid: temporal and spatial based detections., , , and . GIIS, page 1-3. IEEE, (2015)Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology., , and . IEEE Trans. Intell. Transp. Syst., 18 (5): 1143-1153 (2017)Attacks detection and decision framework based on generative adversarial network approach: Case of vehicular edge computing network.. Trans. Emerg. Telecommun. Technol., (2022)Cyber Security Framework for Vehicular Network Based on a Hierarchical Game., , , and . IEEE Trans. Emerg. Top. Comput., 9 (1): 429-440 (2021)Software-Defined heterogeneous vehicular networks: Taxonomy and architecture., , , , and . GIIS, page 50-55. IEEE, (2017)Zero Trust Architecture Empowered Attack Detection Framework to Secure 6G Edge Computing., and . IEEE Netw., 38 (1): 196-202 (January 2024)Two-Levels Verification for Secure Data Aggregation in Resource-Constrained Environments., , and . ICC, page 1-6. IEEE, (2018)