From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges., , , , , , и . Comput. Networks, (2022)Managing AAA in NFV/SDN-enabled IoT scenarios., , , , , и . GIoTS, стр. 1-7. IEEE, (2018)Network slicing as 6G security mechanism to mitigate cyber-attacks: the RIGOUROUS approach., , , , и . NetSoft, стр. 387-392. IEEE, (2024)Design-Time Learning for Operational Planning Improvement., , , , и . SECURWARE, стр. 326-331. IEEE Computer Society, (2008)Security Orchestration and Enforcement in NFV/SDN-Aware UAV Deployments., , , , и . IEEE Access, (2020)Managing Context Information for Adaptive Security in IoT Environments., , и . AINA Workshops, стр. 676-681. IEEE Computer Society, (2015)A required security and privacy framework for smart objects., , и . Kaleidoscope, стр. 1-7. IEEE, (2015)Enhancing Extensive and Remote LoRa Deployments through MEC-Powered Drone Gateways., , , , , , и . Sensors, 20 (15): 4109 (2020)Certificateless and Privacy-Enhancing Group Sharing Mechanism for the Future Internet., , , и . IMIS, стр. 313-318. IEEE Computer Society, (2015)Privacy-Preserving Identity Management and Applications to Academic Degree Verification., , , , , и . Privacy and Identity Management, том 644 из IFIP Advances in Information and Communication Technology, стр. 33-46. Springer, (2021)