Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust-as-a-Service: A reputation-enabled trust framework for 5G network resource provisioning., , , , and . Comput. Commun., (November 2023)Eight Reasons to Prioritize Brain-Computer Interface Cybersecurity., , and . Commun. ACM, 66 (4): 68-78 (2023)AuthCODE: A privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning., , , and . Comput. Secur., (2021)Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments., , , , , and . Sensors, 19 (5): 1114 (2019)Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments., , , and . Peer-to-Peer Netw. Appl., 14 (5): 2719-2734 (2021)Creation of a Dataset Modeling the Behavior of Malware Affecting the Confidentiality of Data Managed by IoT Devices., , , , , and . Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, volume 1030 of Studies in Computational Intelligence, Springer, (2022)A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets., , , , , and . CoRR, (2020)Towards the autonomous provision of self-protection capabilities in 5G networks., , , and . J. Ambient Intell. Humaniz. Comput., 10 (12): 4707-4720 (2019)Early Detection of Cryptojacker Malicious Behaviors on IoT Crowdsensing Devices., , , , , , and . NOMS, page 1-8. IEEE, (2023)RansomAI: AI-Powered Ransomware for Stealthy Encryption., , , , , , and . GLOBECOM, page 2578-2583. IEEE, (2023)