Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification of Information Flow in Agent-Based Systems., , and . MCETECH, volume 26 of Lecture Notes in Business Information Processing, page 252-266. Springer, (2009)A formal test for detecting information leakage via covert channels., , and . CSIIRW, page 41. ACM, (2011)A lightweight intelligent network intrusion detection system using OCSVM and Pigeon inspired optimizer., , and . Appl. Intell., 52 (4): 3527-3544 (2022)Investigative Support for Information Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics., , and . FNC/MobiSPC, volume 34 of Procedia Computer Science, page 266-275. Elsevier, (2014)On the Logical Foundation of a Personalized Medical Prescription System., , and . IEEE Access, (2020)Object Authentication in the Context of the Internet of Things: A Survey., , , and . J. Cyber Secur. Mobil., 9 (3): 385-448 (2020)Searchable encryption architectures: survey of the literature and proposing a unified architecture., , and . Int. J. Inf. Priv. Secur. Integr., 4 (4): 237-260 (2020)Salp Swarm Optimization Search Based Feature Selection for Enhanced Phishing Websites Detection., , , and . EvoApplications, volume 12694 of Lecture Notes in Computer Science, page 146-161. Springer, (2021)Detecting and Preventing SQL Injection Attacks: A Formal Approach., , and . CCC, page 123-129. IEEE, (2016)Hierarchical architecture and protocol for mobile object authentication in the context of IoT smart cities., , , and . J. Netw. Comput. Appl., (2018)