From post

Controlled Android Application Execution for the IoT Infrastructure.

, , , , и . IoT 360 (1), том 169 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 16-26. (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tracing Software Exploitation., , , и . NSS, том 13041 из Lecture Notes in Computer Science, стр. 340-352. Springer, (2021)Timestamp Analysis for Quality Validation of Network Forensic Data., и . NSS, том 9955 из Lecture Notes in Computer Science, стр. 235-248. Springer, (2016)A Pattern Recognition Scheme for Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks., , и . ICPR (3), стр. 1050-1054. IEEE Computer Society, (2006)An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic., , , и . CW, стр. 23-30. IEEE Computer Society, (2011)LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)., , , , , и . Comput. Secur., (2021)Securing Industrial Control Systems (ICS) Through Attack Modelling and Rule-Based Learning., , и . COMSNETS, стр. 598-602. IEEE, (2024)An informed consent model for managing the privacy paradox in smart buildings., , , и . ASE Workshops, стр. 19-26. ACM, (2020)Evaluation and Analysis of a Digital Forensic Readiness Framework for the IIoT., , , и . ISDFS, стр. 1-6. IEEE, (2024)Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments., , , , , , , и . ARES, стр. 145:1-145:11. ACM, (2024)Deep Learning-Based Intrusion Detection for IoT Networks., , , , , и . PRDC, стр. 256-265. IEEE, (2019)