Author of the publication

A Testbed for Trusted Telecommunications Systems in a Safety Critical Environment.

, , , , , , and . SAFECOMP Workshops, volume 11094 of Lecture Notes in Computer Science, page 87-98. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SOM-ELM - Self-Organized Clustering using ELM., , , , , , , and . Neurocomputing, (2015)ELM-SOM+: A continuous mapping for visualization., , , , , and . Neurocomputing, (2019)Spiking Networks for Improved Cognitive Abilities of Edge Computing Devices., , , , , and . CoRR, (2019)Guest Editorial: Trust, Security and Privacy of 6G., , , , , and . IEEE Netw., 36 (4): 100-102 (2022)On the Development of a Metric for Quality of Information Content over Anonymised Data-Sets., and . QUATIC, page 185-190. IEEE Computer Society, (2016)Mobile Subscriber Profile Data Privacy Breach via 4G Diameter Interconnection., , and . J. ICT Stand., 6 (3): 245-262 (2018)Methodology for Behavioral-based Malware Analysis and Detection Using Random Projections and K-Nearest Neighbors Classifiers., , , and . CIS, page 1016-1023. IEEE Computer Society, (2011)A Testbed for Trusted Telecommunications Systems in a Safety Critical Environment., , , , , , and . SAFECOMP Workshops, volume 11094 of Lecture Notes in Computer Science, page 87-98. Springer, (2018)A Framework for Privacy Quantification: Measuring the Impact of Privacy Techniques Through Mutual Information, Distance Mapping, and Machine Learning., , , , and . Cogn. Comput., 11 (2): 241-261 (2019)Security policies definition and enforcement utilizing policy control function framework in 5G., , , , , , and . Comput. Commun., (2021)