Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A compression strategy for an efficient TSP-based microaggregation., , and . Expert Syst. Appl., 213 (Part): 118980 (2023)Blockchain Mutability: Challenges and Proposed Solutions., , , and . IEEE Trans. Emerg. Top. Comput., 9 (4): 1972-1986 (2021)Unearthing malicious campaigns and actors from the blockchain DNS ecosystem., , , and . Comput. Commun., (2021)Privacy-preserving collaborative filtering: A new approach based on variable-group-size microaggregation., , and . Electron. Commer. Res. Appl., (2019)Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents., , , , , , , and . Comput. Secur., (2022)Optimal parameter estimation for wireless signal analysis in context-aware scenarios: A brief study., , , , , and . IISA, page 1-5. IEEE, (2016)Wandering detection methods in smart cities: Current and new approaches., , and . ISC2, page 1-2. IEEE, (2015)Blockchain Meets Smart Health: Towards Next Generation Healthcare Services., , and . IISA, page 1-8. IEEE Computer Society, (2018)A blockchain-based Forensic Model for Financial Crime Investigation: The Embezzlement Scenario., and . CoRR, (2020)A k-anonymous approach to privacy preserving collaborative filtering., , , , and . J. Comput. Syst. Sci., 81 (6): 1000-1011 (2015)