Your selections:
Detection and compensation of covert service-degrading intrusions in cyber physical systems through intelligent adaptive control
- Farivar, Faezeh, Haghighi, Mohammad, Barchinezhad, Soheila, Jolfaei, Alireza
Differentially private streaming to untrusted edge servers in intelligent transportation system
- Ezabadi, Soheila, Jolfaei, Alireza, Kulik, Lars, Ramamohanarao, Kotagiri
Privacy and Security of Connected Vehicles in Intelligent Transportation System
- Jolfaei, Alireza, Kant, Krishna
Security hardening of implantable cardioverter defibrillators
- Jaffar, Iram, Usman, Muhammad, Jolfaei, Alireza
Vulnerability modelling for hybrid IT systems
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzuman, Joarder, Jolfaei, Alireza
Are you sure you would like to clear your session, including search history and login status?