Author of the publication

A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge.

, , , , and . SP (Workshops), page 256-261. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Tunnels in PCAP Data by Random Forests., , , , , and . CISRC, page 16:1-16:4. ACM, (2016)A Survey of Deep Learning Methods for Cyber Security., , , and . Information, 10 (4): 122 (2019)Trust Me, I'm Lying: Enhancing Machine-to-Machine Trust., , , , , , , and . ICCPS, page 1-2. IEEE, (2022)Using sequential pattern mining for common event format (CEF) cyber data., , , , , and . CISRC, page 2:1-2:4. ACM, (2017)Envisioning Cybersecurity Analytics for the Internet of Things., and . 5G World Forum, page 193-198. IEEE, (2020)Distributed Ledgers for Enhanced Machine-to-Machine Trust in Smart Cities., , , , , , , and . ICCCN, page 1-7. IEEE, (2022)A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge., , , , and . SP (Workshops), page 256-261. IEEE, (2020)Identification of Botnet Activity in IoT Network Traffic Using Machine Learning., , , , and . IDSTA, page 21-27. IEEE, (2020)Architecting an Enterprise-of-Enterprises with the 10-Layer Rubric: Transforming EoE Decision-Making., , , and . SysCon, page 1-8. IEEE, (2023)Using semi-supervised machine learning to address the Big Data problem in DNS networks., , , , , , , and . CCWC, page 1-6. IEEE, (2017)