BibTeX records: Anika Anwar

download as .bib file

@article{DBLP:journals/vcomm/AnwarAMZ23,
  author       = {Akib Anwar and
                  Anika Anwar and
                  Lama Moukahal and
                  Mohammad Zulkernine},
  title        = {Security assessment of in-vehicle communication protocols},
  journal      = {Veh. Commun.},
  volume       = {44},
  pages        = {100639},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.vehcom.2023.100639},
  doi          = {10.1016/J.VEHCOM.2023.100639},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vcomm/AnwarAMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/AnwarHZ22,
  author       = {Anika Anwar and
                  Talal Halabi and
                  Mohammad Zulkernine},
  title        = {Scalable Collaborative Intrusion Detection in Autonomous Vehicular
                  Networks: {A} hierarchical framework based on game theory},
  journal      = {Internet Things},
  volume       = {20},
  pages        = {100631},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.iot.2022.100631},
  doi          = {10.1016/J.IOT.2022.100631},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iot/AnwarHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/AnwarHZ22,
  author       = {Anika Anwar and
                  Talal Halabi and
                  Mohammad Zulkernine},
  title        = {A coalitional security game against data integrity attacks in autonomous
                  vehicle networks},
  journal      = {Veh. Commun.},
  volume       = {37},
  pages        = {100517},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.vehcom.2022.100517},
  doi          = {10.1016/J.VEHCOM.2022.100517},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/AnwarHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csnet/AnwarHZ19,
  author       = {Anika Anwar and
                  Talal Halabi and
                  Mohammad Zulkernine},
  title        = {Cloud-based Sybil Attack Detection Scheme for Connected Vehicles},
  booktitle    = {3rd Cyber Security in Networking Conference, CSNet 2019, Quito, Ecuador,
                  October 23-25, 2019},
  pages        = {114--121},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSNet47905.2019.9108923},
  doi          = {10.1109/CSNET47905.2019.9108923},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csnet/AnwarHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/AnwarH17,
  author       = {Anika Anwar and
                  Tanzima Hashem},
  editor       = {Volker Markl and
                  Salvatore Orlando and
                  Bernhard Mitschang and
                  Periklis Andritsos and
                  Kai{-}Uwe Sattler and
                  Sebastian Bre{\ss}},
  title        = {Optimal Obstructed Sequenced Route Queries in Spatial Databases},
  booktitle    = {Proceedings of the 20th International Conference on Extending Database
                  Technology, {EDBT} 2017, Venice, Italy, March 21-24, 2017},
  pages        = {522--525},
  publisher    = {OpenProceedings.org},
  year         = {2017},
  url          = {https://doi.org/10.5441/002/edbt.2017.60},
  doi          = {10.5441/002/EDBT.2017.60},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edbt/AnwarH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AnwarAHM15,
  author       = {Anika Anwar and
                  Ishrat Ahmed and
                  Tanzima Hashem and
                  Jalal Mahmud},
  title        = {Impact of Imbalance Usage of Social Networking Sites on Families},
  journal      = {CoRR},
  volume       = {abs/1510.07382},
  year         = {2015},
  url          = {http://arxiv.org/abs/1510.07382},
  eprinttype    = {arXiv},
  eprint       = {1510.07382},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AnwarAHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/AliHAKAT14,
  author       = {Mohammed Eunus Ali and
                  Tanzima Hashem and
                  Anika Anwar and
                  Lars Kulik and
                  Ishrat Ahmed and
                  Egemen Tanin},
  editor       = {A. J. Brush and
                  Adrian Friday and
                  Julie A. Kientz and
                  James Scott and
                  Junehwa Song},
  title        = {Protecting mobile users from visual privacy attacks},
  booktitle    = {Proceedings of the 2014 {ACM} International Joint Conference on Pervasive
                  and Ubiquitous Computing, UbiComp '14 Adjunct Publication, Seattle,
                  WA, {USA} - September 13 - 17, 2014},
  pages        = {1--4},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2638728.2638788},
  doi          = {10.1145/2638728.2638788},
  timestamp    = {Tue, 26 Mar 2024 11:01:21 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/AliHAKAT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itse/RahmanFAA11,
  author       = {Md. Mustafizur Rahman and
                  S. M. Ferdous and
                  Syed Ishtiaque Ahmed and
                  Anika Anwar},
  title        = {Speech development of autistic children by interactive computer games},
  journal      = {Interact. Technol. Smart Educ.},
  volume       = {8},
  number       = {4},
  pages        = {208--223},
  year         = {2011},
  url          = {https://doi.org/10.1108/17415651111189450},
  doi          = {10.1108/17415651111189450},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itse/RahmanFAA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalt/AnwarRFAA11,
  author       = {Anika Anwar and
                  Md. Mustafizur Rahman and
                  S. M. Ferdous and
                  Samiul Alam Anik and
                  Syed Ishtiaque Ahmed},
  title        = {A Computer Game Based Approach for Increasing Fluency in the Speech
                  of the Autistic Children},
  booktitle    = {{ICALT} 2011, 11th {IEEE} International Conference on Advanced Learning
                  Technologies, Athens, Georgia, USA, 6-8 July 2011},
  pages        = {17--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICALT.2011.13},
  doi          = {10.1109/ICALT.2011.13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalt/AnwarRFAA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics