Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Machine Learning Auditing Model for Detection of Multi-Tenancy Issues Within Tenant Domain., , , and . CCGrid, page 543-552. IEEE Computer Society, (2018)Identity and Access Management for IoT in Smart Grid., , , and . AINA, volume 1151 of Advances in Intelligent Systems and Computing, page 1215-1226. Springer, (2020)An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT., , , and . GLOBECOM, page 1-6. IEEE, (2015)A Reliable Semi-Supervised Intrusion Detection Model: One Year of Network Traffic Anomalies., , , and . ICC, page 1-6. IEEE, (2020)A Smart Meter and Smart House Integrated to an IdM and Key-based Scheme for Providing Integral Security for a Smart Grid ICT., , , , , , , , and . Mob. Networks Appl., 23 (4): 967-981 (2018)A multi-domain role activation model., , , and . ICC, page 1-6. IEEE, (2017)Enabling Anomaly-based Intrusion Detection Through Model Generalization., , , and . ISCC, page 934-939. IEEE, (2018)Stream learning and anomaly-based intrusion detection in the adversarial settings., , , and . ISCC, page 773-778. IEEE Computer Society, (2017)Providing security and privacy in smart house through mobile cloud computing., , , , and . LATINCOM, page 1-6. IEEE, (2016)SDN-based and multitenant-aware resource provisioning mechanism for cloud-based big data streaming., , , and . J. Netw. Comput. Appl., (2019)