Author of the publication

Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges and Future Directions.

, , , , , , and . IEEE Secur. Priv., 19 (1): 12-23 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Physical layer authentication of Internet of Things wireless devices using convolutional neural networks and recurrence plots., , and . Internet Technol. Lett., (2019)Experimentally detecting IEEE 802.11n Wi-Fi based on cyclostationarity features for ultra-wide band cognitive radios., , and . PIMRC, page 2315-2319. IEEE, (2009)The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices., , , , and . SCVT, page 1-6. IEEE, (2017)Detection of DECT identity spoofing through radio frequency fingerprinting., , , and . MIPRO, page 1296-1301. IEEE, (2015)SecKit: A Model-based Security Toolkit for the Internet of Things., , , and . Comput. Secur., (2015)Experimental passive eavesdropping of Digital Enhanced Cordless Telecommunication voice communications through low-cost software-defined radios., , , and . Secur. Commun. Networks, 8 (3): 403-417 (2015)Nakagami-m Fading Channel Identification Using Adaptive Continuous Wavelet Transform and Convolutional Neural Networks., and . Algorithms, 16 (6): 277 (June 2023)Public Safety Mobile Broadband: A Techno-Economic Perspective., , , and . IEEE Veh. Technol. Mag., 8 (2): 28-36 (2013)A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components., and . IEEE Commun. Surv. Tutorials, 19 (3): 1761-1789 (2017)Identification of Mobile Phones Using the Built-In Magnetometers Stimulated by Motion Patterns., , , , , and . Sensors, 17 (4): 783 (2017)