Author of the publication

Malicious Activity Detection using Smart Contracts in IoT.

, , and . IoTBDS, page 286-295. SCITEPRESS, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Data Sharing between Healthcare Providers using Blockchain., , , and . IoTBDS, page 349-358. SCITEPRESS, (2020)Risk-Based Access Control Model: A Systematic Literature Review., , , , and . Future Internet, 12 (6): 103 (2020)Intelligence of Things: Opportunities & Challenges., , and . CIoT, page 1-6. IEEE, (2018)Integration of Cloud Computing with Internet of Things: Challenges and Open Issues., , , , and . iThings/GreenCom/CPSCom/SmartData, page 670-675. IEEE Computer Society, (2017)Fog Computing and the Internet of Things: A Review., , and . Big Data Cogn. Comput., 2 (2): 10 (2018)An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things., , , and . IoTBDS, page 254-260. SciTePress, (2017)Developing an Adaptive Risk-Based Access Control Model for the Internet of Things., , , , and . iThings/GreenCom/CPSCom/SmartData, page 655-661. IEEE Computer Society, (2017)Chapter Three - Intersections between IoT and distributed ledger., and . Advances in Computers, (2019)Internet of Nano Things: Security Issues and Applications., , and . ICCBDC, page 71-77. ACM, (2018)IoT Forensics: A State-of-the-Art Review, Challenges and Future Directions., , , , and . COMPLEXIS, page 106-115. SciTePress, (2019)