Author of the publication

Editorial: special issue on advances in security and privacy for future mobile communications.

, , and . Electron. Commer. Res., 15 (1): 73-74 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial: special issue on advances in security and privacy for future mobile communications., , and . Electron. Commer. Res., 15 (1): 73-74 (2015)Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach., , and . IEEE Internet Comput., 18 (2): 32-40 (2014)Resolving privacy-preserving relationships over outsourced encrypted data storages., , , , and . Int. J. Inf. Sec., 15 (2): 195-209 (2016)Meta-Tacs: A Trust Model Demonstration Of Robustness Through A Genetic Algorithm., , and . Intell. Autom. Soft Comput., 17 (1): 41-59 (2011)Screening Out Social Bots Interference: Are There Any Silver Bullets?, , , , , , and . IEEE Communications Magazine, 57 (8): 98-104 (2019)Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems., and . Comput. Stand. Interfaces, 32 (4): 185-196 (2010)Dynamic counter-measures for risk-based access control systems: An evolutive approach., , , and . Future Gener. Comput. Syst., (2016)Dendron : Genetic trees driven rule induction for network intrusion detection systems., , and . Future Gener. Comput. Syst., (2018)A Bio-Inspired Reaction Against Cyberattacks: AIS-Powered Optimal Countermeasures Selection., , and . IEEE Access, (2021)MalSEIRS: Forecasting Malware Spread Based on Compartmental Models in Epidemiology., , , , and . Complex., (2021)