Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring Data Analytics of Data Variety., , and . WorldCIST (2), volume 746 of Advances in Intelligent Systems and Computing, page 920-930. Springer, (2018)Virtualizing Programmable Logic Controllers: Toward a Convergent Approach., , and . IEEE Embed. Syst. Lett., 8 (4): 69-72 (2016)Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence., , , and . IEEE Access, (2018)A Network Intrusion Detection System for Building Automation and Control Systems., , and . IEEE Access, (2023)A stealth monitoring mechanism for cyber-physical systems., , , and . Int. J. Crit. Infrastructure Prot., (2019)Integrated protection of industrial control systems from cyber-attacks: the ATENA approach., , , , , , , , , and 8 other author(s). Int. J. Crit. Infrastructure Prot., (2018)A forensics and compliance auditing framework for critical infrastructure protection., , , and . Int. J. Crit. Infrastructure Prot., (September 2023)Evolving L-Systems with Musical Notes., , , , and . EvoMUSART, volume 9596 of Lecture Notes in Computer Science, page 186-201. Springer, (2016)Current and Future Trends in Mobile Device Forensics: A Survey., , , and . ACM Comput. Surv., 51 (3): 46:1-46:31 (2018)A Framework for Internet Media Services Delivery to the Home Environment., , , , and . J. Netw. Syst. Manag., 21 (1): 99-127 (2013)