Search

Your search keyword '"Gurtov, A."' showing total 157 results

Search Constraints

Start Over You searched for: Author "Gurtov, A." Remove constraint Author: "Gurtov, A." Publisher linkopings universitet, tekniska fakulteten Remove constraint Publisher: linkopings universitet, tekniska fakulteten
157 results on '"Gurtov, A."'

Search Results

1. Post Quantum Secure Handover Mechanism for Next Generation Aviation Communication Networks

2. Post Quantum Secure Handover Mechanism for Next Generation Aviation Communication Networks

3. Post Quantum Secure Handover Mechanism for Next Generation Aviation Communication Networks

4. Post Quantum Secure Handover Mechanism for Next Generation Aviation Communication Networks

5. A systematic review of cybersecurity assessment methods for HTTPS

6. Towards a federated and hybrid cloud computing environment for sustainable and effective provisioning of cyber security virtual laboratories

7. A Wireless Caching Helper System Serving Heterogeneous Traffic with Secrecy Constraints

8. INTRUSION DETECTION IN AUTOMATIC DEPENDENT SURVEILLANCE-BROADCAST USING MACHINE LEARNING

9. Trustworthy Device Identifiers For Unmanned Aircraft and Other Mobile Things

10. Formal Verification and Security Assessment of the Drone Remote Identification Protocol

11. GAN-Based Evasion Attack in Filtered Multicarrier Waveforms Systems

12. AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications

13. AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications

14. Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT

15. An empirical assessment of ensemble methods and traditional machine for web-based attack detection in 5.0

16. Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT

17. An empirical assessment of ensemble methods and traditional machine for web-based attack detection in 5.0

18. An empirical assessment of ensemble methods and traditional machine for web-based attack detection in 5.0

19. Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT

20. AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications

21. AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications

22. AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications

23. An empirical assessment of ensemble methods and traditional machine for web-based attack detection in 5.0

24. KDC Placement Problem in Secure VPLS Networks

25. Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT

26. An empirical assessment of ensemble methods and traditional machine for web-based attack detection in 5.0

27. Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT

28. Drone Remote Identification Protocol (DRIP) Architecture

29. DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)

30. Peer-to-Peer Misbehavior Reporting Using Non-Interactive Zero-Knowledge Proofs for Intelligent Transport Systems

31. Enhancing Cybersecurity for LDACS: a Secure and Lightweight Mutual Authentication and Key Agreement Protocol

32. Towards 6G-Enabled Internet of Vehicles: Security and Privacy

33. Towards 6G-Enabled Internet of Vehicles: Security and Privacy

34. QUIC Throughput and Fairness over Dual Connectivity

35. A user-centric privacy-preserving authentication protocol for IoT-AmI environments

36. Security of Satellite-Terrestrial Communications : Challenges and Potential Solutions

37. QUIC Throughput and Fairness over Dual Connectivity

38. A user-centric privacy-preserving authentication protocol for IoT-AmI environments

39. QUIC Throughput and Fairness over Dual Connectivity

40. Security of Satellite-Terrestrial Communications : Challenges and Potential Solutions

41. A user-centric privacy-preserving authentication protocol for IoT-AmI environments

42. Security of Satellite-Terrestrial Communications : Challenges and Potential Solutions

43. Towards 6G-Enabled Internet of Vehicles: Security and Privacy

44. QUIC Throughput and Fairness over Dual Connectivity

45. RFC 9153 : Drone Remote Identification Protocol (DRIP) Requirements and Terminology

46. POSTER: FL-Guard: A Federated Learning Based Ground-AirSecure Communication Model For Future Aviation Network

47. A Federated Learning Based Privacy-Preserving Intrusion Detection System For The Cpdlc

48. A user-centric privacy-preserving authentication protocol for IoT-AmI environments

49. QUIC Throughput and Fairness over Dual Connectivity

50. A user-centric privacy-preserving authentication protocol for IoT-AmI environments

Catalog

Books, media, physical & digital resources