Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Early Detection of Host-based Intrusions in Linux Environment., , , and . EIT, page 475-479. IEEE, (2020)Analysis of Global Positioning System-based attacks and a novel Global Positioning System spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation., , and . Simul., 93 (5): 427-441 (2017)A comprehensive micro unmanned aerial vehicle (UAV/Drone) forensic framework., , , and . Digital Investigation, (2019)GNSSim: An Open Source GNSS/GPS Framework for Unmanned Aerial Vehicular Network Simulation., , , and . EAI Endorsed Trans. Mob. Commun. Appl., 2 (6): e2 (2015)Security Modeling of Autonomous Systems: A Survey., , , and . ACM Comput. Surv., 52 (5): 91:1-91:34 (2019)A Machine Learning Based Smartphone App for GPS Spoofing Detection., , , , , , and . SecureComm (2), volume 336 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 235-241. Springer, (2020)A Non-Cooperative Game based Model for the Cybersecurity of Autonomous Systems., , and . SP (Workshops), page 202-207. IEEE, (2020)Machine Learning-based Primary User Emulation Attack Detection In Cognitive Radio Networks using Pattern Described Link-Signature (PDLS)., , , , , and . WTS, page 1-7. IEEE, (2019)