Author of the publication

An Uncertainty-Driven Proactive Self-Healing Model for Pervasive Applications.

, , and . Network, 2 (4): 568-582 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Query Driven Data Subspace Mapping., , , and . AIAI (2), volume 647 of IFIP Advances in Information and Communication Technology, page 496-508. Springer, (2022)Digital Twins and Cyber Security - solution or challenge?, , , , , and . SEEDA-CECNSM, page 1-8. IEEE, (2021)Cybersecurity Revisited: Honeytokens meet Google Authenticator., , , , , , and . CoRR, (2021)A Novel Authentication Method That Combines Honeytokens and Google Authenticator., , , , , , and . Inf., 14 (7): 386 (2023)Security Revisited: Honeytokens meet Google Authenticator., , , , , , and . SEEDA-CECNSM, page 1-8. IEEE, (2022)An Uncertainty-Driven Proactive Self-Healing Model for Pervasive Applications., , and . Network, 2 (4): 568-582 (2022)From Cyber Terrorism to Cyber Peacekeeping: Are we there yet?, , , , and . PCI, page 334-339. ACM, (2020)A Proactive Uncertainty driven Model for Tasks Offloading., , and . CoRR, (2022)Quantum Cryptography in Maritime Telecommunications., , , , and . CSR, page 530-535. IEEE, (2021)