Search

Your search keyword '"Gurtov, A."' showing total 239 results

Search Constraints

Start Over You searched for: Author "Gurtov, A." Remove constraint Author: "Gurtov, A." Publisher ieee Remove constraint Publisher: ieee
239 results on '"Gurtov, A."'

Search Results

1. Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions

2. Towards 6G-Enabled Internet of Vehicles: Security and Privacy

3. The Roadmap to 6G Security and Privacy

4. Trustworthy Device Identifiers For Unmanned Aircraft and Other Mobile Things

5. Machine Learning Meets Communication Networks: Current Trends and Future Challenges

8. Trends and Detection Avoidance of Internet-Connected Industrial Control Systems

10. Enhancing Cybersecurity for LDACS: a Secure and Lightweight Mutual Authentication and Key Agreement Protocol

11. Secure Hierarchical VPLS Architecture for Provider Provisioned Networks

12. Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications

17. Towards convergence of AI and IoT for energy efficient communication in smart homes

19. A Security Model for Controller-Pilot Data Communication Link

20. Simulating ADS-B Attacks in Air Traffic Management

21. Aviation Scenarios for 5G and Beyond

22. Demonstrating ADS-B AND CPDLC Attacks with Software-Defined Radio

23. Towards Wearable Sensing Enabled Healthcare Framework for Elderly Patients

24. The roadmap to 6G security and privacy

25. CONTROLLER PILOT DATA LINK COMMUNICATION SECURITY: A PRACTICAL STUDY

26. A SECURITY MODEL FOR CONTROLLER-PILOT DATA COMMUNICATION LINK

27. The quest for resilient (static) forwarding tables

28. Intrusion Detection in Automatic Dependent Surveillance-Broadcast (ADS-B) with Machine Learning

35. Watch Your Step! Detecting Stepping Stones in Programmable Networks

36. Enabling End-to-End Secure Connectivity for Low-Power IoT Devices with UAVs

37. DEMONSTRATING ADS-B AND CPDLC ATTACKS WITH SOFTWARE-DEFINED RADIO

38. Simulating ADS-B Attacks in Air Traffic Management

39. Towards Wearable Sensing Enabled Healthcare Framework for Elderly Patients

40. Towards 5G-Enabled Self Adaptive Green and Reliable Communication in Intelligent Transportation System.

41. DEMO: Mobile Relay Architecture for Low-Power IoT Devices

42. Analyzing Internet-connected industrial equipment

45. Managing Mobile Relays for Secure E2E Connectivity of Low-Power IoT Devices

46. Watch your step! Detecting stepping stones in programmable networks

47. IoT and HIP's Opportunistic Mode.

48. Secure Hierarchical VPLS Architecture for Provider Provisioned Networks

49. Software defined VPLS architectures: Opportunities and challenges

50. 5G security: Analysis of threats and solutions

Catalog

Books, media, physical & digital resources