From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges., , , , и . IEEE Access, (2020)Cyber security for fog-based smart grid SCADA systems: Solutions and challenges., , и . J. Inf. Secur. Appl., (2020)Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems., , , , и . Sensors, 20 (4): 997 (2020)Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis., , , , и . IEEE Access, (2021)Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning., , , , и . IEEE Access, (2022)ECPDR: An Efficient Conditional Privacy-Preservation Scheme with Demand Response for Secure Ad hoc Social Communications., , и . Int. J. Embed. Real Time Commun. Syst., 4 (3): 43-71 (2013)Cybersecurity Revisited: Honeytokens meet Google Authenticator., , , , , , и . CoRR, (2021)A Novel Authentication Method That Combines Honeytokens and Google Authenticator., , , , , , и . Inf., 14 (7): 386 (2023)Digital Agriculture Security: Aspects, Threats, Mitigation Strategies, and Future Trends., , , и . IEEE Internet Things Mag., 5 (3): 82-90 (2022)SDPP: an intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network., , и . Int. J. Inf. Comput. Secur., 6 (3): 241-269 (2014)