Author of the publication

Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study.

, , , and . DSN Workshops, page 36-43. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Security Checking of Automotive ECUs with Formal CSP Models., , , , and . DSN Workshops, page 90-97. IEEE, (2019)The Development of Constructive Alignment in Activity Led Learning and Assessment of Digital Forensics., and . WCCCE, page 1:1-1:6. ACM, (2014)A taxonomy of validation strategies to ensure the safe operation of highly automated vehicles., , , , and . J. Intell. Transp. Syst., 26 (1): 14-33 (2022)AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey., , , , , and . ACM Comput. Surv., 55 (11): 237:1-237:40 (November 2023)A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example., , , , and . QRS Companion, page 1-8. IEEE, (2019)Generation of Pedestrian Pose Structures using Generative Adversarial Networks., , , , and . ICMLA, page 1644-1650. IEEE, (2019)Context-aware Anomaly Detector for Monitoring Cyber Attacks on Automotive CAN Bus., , , and . CSCS, page 7:1-7:8. ACM, (2019)Performance Boundary Identification for the Evaluation of Automated Vehicles using Gaussian Process Classification., , , , and . ITSC, page 419-424. IEEE, (2019)Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study., , , and . DSN Workshops, page 36-43. IEEE Computer Society, (2017)Towards a systematic security evaluation of the automotive Bluetooth interface., , , and . Veh. Commun., (2017)