Author of the publication

Internet of Threats Introspection in Dynamic Intelligent Virtual Sensing.

, , and . CPSS@IOT, volume 2530 of CEUR Workshop Proceedings, page 22-29. CEUR-WS.org, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proactive Forensics: Keystroke Logging from the Cloud as Potential Digital Evidence for Forensic Readiness Purposes., , , , and . ICIoT, page 200-205. IEEE, (2020)Adding event reconstruction to a Cloud Forensic Readiness model., and . ISSA, page 1-9. IEEE, (2015)A Review of Mobile Forensic Investigation Process Models., , , , and . IEEE Access, (2020)Real-time monitoring as a supplementary security component of vigilantism in modern network environments., , and . CoRR, (2020)Beyond Random Noise: Insights on Anonymization Strategies from a Latent Bandit Study., , , and . CoRR, (2023)Towards an Open-Source Based E-Mail Forensic Tool that uses Headers in Digital Investigation., , , , and . NISS, page 18:1-18:8. ACM, (2023)A comparison of machine learning algorithms on design smell detection using balanced and imbalanced dataset: A study of God class., , , , , and . Inf. Softw. Technol., (2022)A Generic Digital Forensic Investigation Framework for Internet of Things (IoT)., and . FiCloud, page 356-362. IEEE Computer Society, (2016)Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud., , , , and . NISS, page 56:1-56:6. ACM, (2020)Towards a Learning-enabled Virtual Sensor Forensic Architecture Compliant with Edge Intelligence., , , and . IDSTA, page 154-161. IEEE, (2021)