Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assigning Trust to Devices in the Context of Consumer IoT Applications., , , and . IEEE Consumer Electron. Mag., 13 (1): 12-21 (January 2024)Traffic Characterization to Provide Trust for Internet of Things Devices., and . ICUFN, page 311-316. IEEE, (2023)Trust Aspects of Internet of Things in the Context of 5G and Beyond., , , and . CIoT, page 59-66. IEEE, (2020)A Two-level Integrated Approach for Assigning Trust Metrics to Internet of Things Devices., , , and . IoTBDS, page 26-36. SCITEPRESS, (2022)A cooperative approach for a global intrusion detection system for internet service providers., and . CSNet, page 1-8. IEEE, (2017)On the security aspects of Internet of Things: A systematic literature review., , , , , , , and . J. Commun. Networks, 21 (5): 444-457 (2019)Distributed Auction-Based SFC Placement in a Multi-domain 5G Environment., , , , , , , and . SN Comput. Sci., 5 (1): 48 (January 2024)Dynamic and Mobility-Aware VNF Placement in 5G-Edge Computing Environments., , , , , , and . NetSoft, page 53-61. IEEE, (2023)A New Interest-Based Protocol to Hide and Protect Servers in IP Networks., , , , , , , , , and 1 other author(s). ICOIN, page 329-334. IEEE, (2022)