Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A compression strategy for an efficient TSP-based microaggregation., , and . Expert Syst. Appl., 213 (Part): 118980 (2023)Unearthing malicious campaigns and actors from the blockchain DNS ecosystem., , , and . Comput. Commun., (2021)Blockchain Mutability: Challenges and Proposed Solutions., , , and . IEEE Trans. Emerg. Top. Comput., 9 (4): 1972-1986 (2021)Privacy-preserving collaborative filtering: A new approach based on variable-group-size microaggregation., , and . Electron. Commer. Res. Appl., (2019)Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents., , , , , , , and . Comput. Secur., (2022)Wandering detection methods in smart cities: Current and new approaches., , and . ISC2, page 1-2. IEEE, (2015)Optimal parameter estimation for wireless signal analysis in context-aware scenarios: A brief study., , , , , and . IISA, page 1-5. IEEE, (2016)Blockchain Meets Smart Health: Towards Next Generation Healthcare Services., , and . IISA, page 1-8. IEEE Computer Society, (2018)A blockchain-based Forensic Model for Financial Crime Investigation: The Embezzlement Scenario., and . CoRR, (2020)A systematic literature review of blockchain-based applications: Current status, classification and open issues., , and . Telematics Informatics, (2019)