Author of the publication

FUSION - Fog Computing and Blockchain for Trusted Industrial Internet of Things.

, , , , , and . IEEE Trans. Engineering Management, 69 (6): 2944-2958 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification of critical situations via Event Processing and Event Trust Analysis., , , , , and . Knowl. Inf. Syst., 52 (1): 147-178 (2017)Safety-aware metrics for object detectors in autonomous driving., and . CoRR, (2022)Design, implementation, and assessment of a usable multi-biometric continuous authentication system., , , and . Int. J. Crit. Comput. Based Syst., 9 (3): 215-247 (2019)On trustworthy measurements when testing dependable systems: a discussion and experiences., and . Int. J. Crit. Comput. Based Syst., 6 (2): 154-170 (2015)RGB Cameras Failures and Their Effects in Autonomous Driving Applications., and . IEEE Trans. Dependable Secur. Comput., 20 (4): 2731-2745 (July 2023)Evaluation of Anomaly Detection Algorithms Made Easy with RELOAD., , and . ISSRE, page 446-455. IEEE, (2019)On Algorithms Selection for Unsupervised Anomaly Detection., , and . PRDC, page 279-288. IEEE, (2018)Challenging Anomaly Detection in Complex Dynamic Systems., , and . SRDS, page 213-214. IEEE Computer Society, (2016)Meeting the challenges in the design and evaluation of a trackside real-time safety-critical system., , , and . ISORC, page 1-10. IEEE Computer Society, (2013)A Service Discovery Approach for Testing Dynamic SOAs., , and . ISORC Workshops, page 133-142. IEEE Computer Society, (2011)