From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trust-as-a-Service: A reputation-enabled trust framework for 5G network resource provisioning., , , , и . Comput. Commun., (ноября 2023)Towards the autonomous provision of self-protection capabilities in 5G networks., , , и . J. Ambient Intell. Humaniz. Comput., 10 (12): 4707-4720 (2019)Design of a Security and Trust Framework for 5G Multi-domain Scenarios., , , , , , , и . J. Netw. Syst. Manag., 30 (1): 7 (2022)Sustainable securing of Medical Cyber-Physical Systems for the healthcare of the future., , , и . Sustain. Comput. Informatics Syst., (2018)Neuronal Jamming Cyberattack over Invasive BCI Affecting the Resolution of Tasks Requiring Visual Capabilities., , и . CoRR, (2021)Studying Drowsiness Detection Performance while Driving through Scalable Machine Learning Models using Electroencephalography., , , , , и . CoRR, (2022)Robust Federated Learning for execution time-based device model identification under label-flipping attack., , , , и . CoRR, (2021)Evaluation of Data Processing and Machine Learning Techniques in P300-based Authentication using Brain-Computer Interfaces., , , и . CoRR, (2023)Eight Reasons Why Cybersecurity on Novel Generations of Brain-Computer Interfaces Must Be Prioritized., , и . CoRR, (2021)Eight Reasons to Prioritize Brain-Computer Interface Cybersecurity., , и . Commun. ACM, 66 (4): 68-78 (2023)