Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Similarity-based data transmission reduction solution for edge-cloud collaborative AI., , and . AICCC, page 42-48. ACM, (2022)Change Detection Methods for Images Captured by Stationary Camera's., , , and . UCAmI, volume 594 of Lecture Notes in Networks and Systems, page 565-570. Springer, (2022)Intrusion Detection Method Using Neural Networks Based on the Reduction of Characteristics., , , , , and . IWANN (1), volume 5517 of Lecture Notes in Computer Science, page 1296-1303. Springer, (2009)Data Transmission Reduction Model for cloud-based IoT Systems., , and . SmartIoT, page 252-256. IEEE, (2021)Cloud vs Serverless Computing: A Security Point of View., , , and . UCAmI, volume 594 of Lecture Notes in Networks and Systems, page 1098-1109. Springer, (2022)Multilayer Architecture Model for Mobile Cloud Computing Paradigm., , , and . Complex., (2019)Security Alert Correlation Using Growing Neural Gas., , , , , and . CISIS, volume 6694 of Lecture Notes in Computer Science, page 76-83. Springer, (2011)Analysis of Hypervisor Architectures for Improving Cybersecurity in IoT Environments., , and . UCAmI, volume 594 of Lecture Notes in Networks and Systems, page 401-412. Springer, (2022)Network Intrusion Detection System Embedded on a Smart Sensor., , , , , and . IEEE Trans. Ind. Electron., 58 (3): 722-732 (2011)Data transmission reduction formalization for cloud offloading-based IoT systems., , and . J. Cloud Comput., 12 (1): 48 (December 2023)