Your selections:
Differentially private streaming to untrusted edge servers in intelligent transportation system
- Ezabadi, Soheila, Jolfaei, Alireza, Kulik, Lars, Ramamohanarao, Kotagiri
Detection and compensation of covert service-degrading intrusions in cyber physical systems through intelligent adaptive control
- Farivar, Faezeh, Haghighi, Mohammad, Barchinezhad, Soheila, Jolfaei, Alireza
Security hardening of implantable cardioverter defibrillators
- Jaffar, Iram, Usman, Muhammad, Jolfaei, Alireza
A secure lightweight texture encryption scheme
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
Privacy and Security of Connected Vehicles in Intelligent Transportation System
- Jolfaei, Alireza, Kant, Krishna
Security challenges and solutions for 5G HetNet
- Sharma, Aakanksha, Balasubramanian, Venki, Jolfaei, Alireza
Vulnerability modelling for hybrid IT systems
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzuman, Joarder, Jolfaei, Alireza
Cyber resilience modelling for the operations of hybrid network
- Ur-Rehman, Attiq, Kamruzzuman, Joarder, Gondal, Iqbal, Jolfaei, Alireza
Fuzzy-based operational resilience modelling
- Ur-Rehman, Attiq, Kamruzzuman, Joarder, Gondal, Iqbal, Jolfaei, Alireza
Are you sure you would like to clear your session, including search history and login status?