Author of the publication

A wireless propagation analysis for the frequency of the pseudonym changes to support privacy in VANETs.

, , and . MIPRO, page 1269-1274. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Corrigendum to 'VetaDetect: Vehicle tampering detection with closed-loop model ensemble' International Journal of Critical Infrastructure Protection, 37 (2022), 100525., , , , , and . Int. J. Crit. Infrastructure Prot., (2022)Performance Analysis of Long Short-Term Memory-Based Markovian Spectrum Prediction., , , and . IEEE Access, (2021)Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead., , , , , and . IEEE Commun. Surv. Tutorials, 14 (2): 355-379 (2012)A dynamic model of moving flames for the analysis and control of combustion instabilities., , , , , , and . ECC, page 2795-2800. IEEE, (1999)An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure., , , , , , , , , and . Int. J. Crit. Infrastructure Prot., 3 (3-4): 140-156 (2010)Intrusion detection systems in in-vehicle networks based on bag-of-words.. CSNet, page 41-48. IEEE, (2021)Identity-based security systems for vehicular ad-hoc networks., , , , and . ICCVE, page 672-678. IEEE, (2013)Updating IoT devices: challenges and potential approaches., , , and . GIoTS, page 1-5. IEEE, (2020)Implementation of a wireless test bed for the functional verification of the ultra-wideband Detect-and-Avoid mechanism., , , , and . ISWCS, page 26-30. IEEE, (2010)Towards a Mobile Malware Detection Framework with the Support of Machine Learning., , , and . Euro-CYBERSEC, volume 821 of Communications in Computer and Information Science, page 119-129. Springer, (2018)