Author of the publication

Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques.

, , , , and . ICDCS, page 2246-2251. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Signcryption in Hierarchical Identity Based Cryptosystem., , , and . IACR Cryptology ePrint Archive, (2004)WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps., , , , , and . WISEC, page 25:1-25:12. ACM, (2015)Dynamic Software Birthmark for Java Based on Heap Memory Analysis., , and . Communications and Multimedia Security, volume 7025 of Lecture Notes in Computer Science, page 94-107. Springer, (2011)Integrating Different Signature Purposes in Workflow Systems - A Case Study., , and . ICSC, volume 1749 of Lecture Notes in Computer Science, page 360-366. Springer, (1999)Authenticated Directed Diffusion., , and . CANS, volume 5339 of Lecture Notes in Computer Science, page 366-377. Springer, (2008)Randomized Competitive Algorithms for Successful and Unsuccessful Search., and . Comput. J., 39 (5): 427-439 (1996)Unsuccessful Search in Self-Adjusting Data Structures., and . J. Algorithms, 15 (3): 447-481 (1993)Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design., , , , , , , , , and . Quantum Inf. Process., 13 (6): 1425-1435 (2014)MLAS: multiple level authentication scheme for VANETs., , , and . AsiaCCS, page 471-475. ACM, (2011)Providing distributed certificate authority service in cluster-based mobile ad hoc networks., , , , and . Comput. Commun., 30 (11-12): 2442-2452 (2007)