Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks., , , and . Expert Syst. Appl., (2020)Detecting security attacks in cyber-physical systems: a comparison of Mule and WSO2 intelligent IoT architectures., , , , and . PeerJ Comput. Sci., (2021)An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns., , , , and . Eng. Appl. Artif. Intell., 123 (Part B): 106344 (2023)Developing an IoT forensic methodology. A concept proposal., , , and . Digit. Investig., (2021)MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats., , , and . J. Supercomput., 79 (11): 11895-11933 (2023)Non-Volatile Memory Forensic Analysis in Windows 10 IoT Core., , , and . Entropy, 21 (12): 1141 (2019)Automatic Analysis Architecture of IoT Malware Samples., , , , and . Secur. Commun. Networks, (2020)A context-centered methodology for IoT forensic investigations., , , and . Int. J. Inf. Sec., 20 (5): 647-673 (2021)Attack Pattern Recognition in the Internet of Things using Complex Event Processing and Machine Learning., , , , and . SMC, page 1919-1926. IEEE, (2021)A MEC-IIoT intelligent threat detector based on machine learning boosted tree algorithms., , , , and . Comput. Networks, (September 2023)