Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial to the Special Issue on Recent Advances on Trust, Security and Privacy in Computing and Communications., , and . Concurr. Comput. Pract. Exp., (2019)BuildSenSys: Reusing Building Sensing Data for Traffic Prediction With Cross-Domain Learning., , , , , , , and . IEEE Trans. Mob. Comput., 20 (6): 2154-2171 (2021)Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing., , , , , and . IEEE Commun. Mag., 56 (5): 60-65 (2018)Anomaly Detection in Smart Grid Networks Using Power Consumption Data., , , and . SECRYPT, page 830-837. SCITEPRESS, (2023)ZT-NIDS: Zero Trust, Network Intrusion Detection System., , and . SECRYPT, page 99-110. SCITEPRESS, (2023)Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques., , , , and . SECRYPT, page 813-821. SCITEPRESS, (2023)An Overview of Security Challenges in Vehicular Ad-Hoc Networks., , and . ICIT, page 208-213. IEEE, (2017)Routing scheme for a Wireless Sensor Network real-time locating system., , , and . IWCMC, page 159-164. IEEE, (2013)A Sybil attack detection scheme for a forest wildfire monitoring application., , , and . Future Gener. Comput. Syst., (2018)Enabling secure lightweight mobile Narrowband Internet of Things (NB-IoT) applications using blockchain., , , and . J. Netw. Comput. Appl., (October 2023)