Author of the publication

Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection System.

, , , and . FAS*W@SASO/ICCAC, page 324-328. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the integration of artifact lifecycles., , , and . MEDES, page 59-63. ACM, (2015)Extracting Information From Coarser-grained Data in XML Documents.. J. Digit. Inf. Manag., 4 (2): 117-123 (2006)Resilient and Trustworthy Dynamic Data-driven Application Systems (DDDAS) Services for Crisis Management Environments., , , and . ICCS, volume 51 of Procedia Computer Science, page 2623-2637. Elsevier, (2015)Towards Security Awareness in Designing Service-oriented Architectures., , , and . ICEIS (3), page 347-355. SciTePress, (2013)Correction to "The Integration of Corporate Security Strategies in Collaborative Business Processes"., , and . IEEE Trans. Serv. Comput., 5 (1): 144 (2012)Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions., and . Sensors, 18 (12): 4215 (2018)On the Testability of Artificial Intelligence and Machine Learning Systems., , , and . Computer, 55 (3): 101-105 (2022)Erratum: "Hybrid Group Recommendation Using Modified Termite Colony Algorithm: A Context Towards Big Data"., , , , and . J. Inf. Knowl. Manag., 18 (3): 1992001:1 (2019)Lung cancer survival period prediction and understanding: Deep learning approaches., , and . Int. J. Medical Informatics, (2021)Security and privacy in the Internet of Things: threats and challenges., , and . Serv. Oriented Comput. Appl., 15 (4): 257-271 (2021)