Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AuthCODE: A Privacy-preserving and Multi-device Continuous Authentication Architecture based on Machine and Deep Learning., , , and . CoRR, (2020)A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets., , , , , and . CoRR, (2020)Trust-as-a-Service: A reputation-enabled trust framework for 5G network resource provisioning., , , , and . Comput. Commun., (November 2023)Sustainable securing of Medical Cyber-Physical Systems for the healthcare of the future., , , and . Sustain. Comput. Informatics Syst., (2018)Neuronal Jamming Cyberattack over Invasive BCI Affecting the Resolution of Tasks Requiring Visual Capabilities., , and . CoRR, (2021)Studying Drowsiness Detection Performance while Driving through Scalable Machine Learning Models using Electroencephalography., , , , , and . CoRR, (2022)Robust Federated Learning for execution time-based device model identification under label-flipping attack., , , , and . CoRR, (2021)Evaluation of Data Processing and Machine Learning Techniques in P300-based Authentication using Brain-Computer Interfaces., , , and . CoRR, (2023)Design of a Security and Trust Framework for 5G Multi-domain Scenarios., , , , , , , and . J. Netw. Syst. Manag., 30 (1): 7 (2022)Eight Reasons Why Cybersecurity on Novel Generations of Brain-Computer Interfaces Must Be Prioritized., , and . CoRR, (2021)