Cited By
View all- Wang XZhao ZYi LNing ZGuo LYu FGuo S(2024)A Survey on Security of UAV Swarm Networks: Attacks and CountermeasuresACM Computing Surveys10.1145/370362557:3(1-37)Online publication date: 22-Nov-2024
- Rajaoarisoa LKuk MBobek SSayed-Mouchaweh M(2024)Hybrid and co-learning approach for anomalies prediction and explanation of wind turbine systemsEngineering Applications of Artificial Intelligence10.1016/j.engappai.2024.108046133:PAOnline publication date: 1-Jul-2024
- Borowski MPal CSaha SPoli LZhai XMcDonald-Maier K(2023)Anomaly Behaviour tracing of CHERI-RISC V using Hardware-Software Co-design2023 21st IEEE Interregional NEWCAS Conference (NEWCAS)10.1109/NEWCAS57931.2023.10198103(1-5)Online publication date: 26-Jun-2023
- Show More Cited By