Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments., , , and . NDSS, The Internet Society, (2005)A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN)., , and . ICST Trans. Security Safety, 4 (12): e2 (2017)GNSSim: An Open Source GNSS/GPS Framework for Unmanned Aerial Vehicular Network Simulation., , , and . ICST Trans. Mobile Communications Applications, 2 (6): e2 (2015)Security Modeling of Autonomous Systems: A Survey., , , and . ACM Comput. Surv., 52 (5): 91:1-91:34 (2019)Trust System Design Optimization in Smart Grid Network Infrastructure., , and . IEEE Trans. Smart Grid, 4 (1): 184-195 (2013)UAVNet Simulation in UAVSim: A Performance Evaluation and Enhancement., , and . TRIDENTCOM, volume 137 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 107-115. Springer, (2014)FPGA based key generation technique for anti-counterfeiting methods using Physically Unclonable Functions and artificial intelligence., , and . FPL, page 388-393. IEEE, (2012)A neural network based distributed intrusion detection system on cloud platform., , and . CCIS, page 75-79. IEEE, (2012)Impact on SDN Powered Network Services Under Adversarial Attacks., , and . SCSE, volume 62 of Procedia Computer Science, page 228-235. Elsevier, (2015)Distributed network traffic feature extraction for a real-time IDS., , , , and . EIT, page 522-526. IEEE, (2016)