Search for persons
X
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Digital Forensics and Cyber Crime ,
2
Detection of Targeted Attacks Using Medium-Interaction Hone..:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Digital Forensics and Cyber Crime ,
3
Quantum Computing Challenges and Impact on Cyber Security:
, In:
?
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
7
Ax-to-Grind Urdu: Benchmark Dataset for Urdu Fake News Dete..:
, In:
?
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
9
A Scalable Pattern Matching Implementation on Hardware usin..:
, In:
?
ICC 2023 - IEEE International Conference on Communications ,
10
An Efficient Scheduling Scheme for Unmanned Aerial Vehicle ..:
, In:
?
Recent Advancements in Connected Autonomous Vehicle Technologies; Automated and Electric Vehicle: Design, Informatics and Sustainability ,
11
Intrusion Detection System for Connected Automobiles Securi..:
, In:
?
2022 International Conference on Frontiers of Information Technology (FIT) ,
13
Cyber Attacks and Vulnerabilities Assessment for Unmanned A..:
, In:
?
2022 9th International Conference on Internet of Things: Systems, Management and Security (IOTSMS) ,
14
Developing Realistic Distributed Denial of Service (DDoS) D..:
, In:
?
2019 International Conference on Frontiers of Information Technology (FIT) ,
15