Author of the publication

Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach.

, , , , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comprehensive Study of the IoT Cybersecurity in Smart Cities., , , and . IEEE Access, (2020)Metrics and Indicators of Information Security Incident Management: A Systematic Mapping Study., , , , , , and . MICRADS, volume 152 of Smart Innovation, Systems and Technologies, page 507-519. Springer, (2019)A Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy., , , , , , and . ICEIS (2), page 328-336. SciTePress, (2019)Defining Cyber Risk Scenarios to Evaluate IoT Systems., , , , and . Games, 14 (1): 1 (February 2023)Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach., , , , , , and . IEEE Access, (2019)Cognitive security: A comprehensive study of cognitive science in cybersecurity., and . J. Inf. Secur. Appl., (2019)Obfuscated Privacy Malware Classifiers Based on Memory Dumping Analysis., , , , and . IEEE Access, (2024)Cybersecurity Risk of IoT on Smart Cities, , and . Springer, (2021)Smart Home IoT Network Risk Assessment Using Bayesian Networks., , , and . Entropy, 24 (5): 668 (2022)Prototype of an Emergency Response System Using IoT in a Fog Computing Environment., , , and . Comput., 12 (4): 81 (April 2023)