Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems., , , , and . Sensors, 20 (4): 997 (2020)ECPDR: An Efficient Conditional Privacy-Preservation Scheme with Demand Response for Secure Ad hoc Social Communications., , and . Int. J. Embed. Real Time Commun. Syst., 4 (3): 43-71 (2013)Cyber security for fog-based smart grid SCADA systems: Solutions and challenges., , and . J. Inf. Secur. Appl., (2020)A Novel Authentication Method That Combines Honeytokens and Google Authenticator., , , , , , and . Inf., 14 (7): 386 (2023)Cybersecurity Revisited: Honeytokens meet Google Authenticator., , , , , , and . CoRR, (2021)Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis., , , , and . IEEE Access, (2021)Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning., , , , and . IEEE Access, (2022)Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges., , , , and . IEEE Access, (2020)Cyber security of critical infrastructures., , , , , , , and . ICT Express, 4 (1): 42-45 (2018)Fighting COVID-19 and Future Pandemics With the Internet of Things: Security and Privacy Perspectives., , and . IEEE CAA J. Autom. Sinica, 8 (9): 1477-1499 (2021)