Author of the publication

Intrusion and anomaly detection for the next-generation of industrial automation and control systems.

, , , , , , , and . Future Gener. Comput. Syst., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quality of Service Routing., , , , , , , , and . QofIS Final Report, volume 2856 of Lecture Notes in Computer Science, Springer, (2003)What is the Cost of the Index Selector Task for OFDM with Index Modulation?, , and . Wireless Days, page 1-8. IEEE, (2019)On Evaluating a WiMAX Access Network for Isolated Research and Data Networks Using NS-2., , , , , and . NEW2AN, volume 4712 of Lecture Notes in Computer Science, page 133-147. Springer, (2007)Data aggregation for machine-to-machine communication with energy harvesting., , , and . M&N, page 1-6. IEEE, (2015)A Receiver-Driven Adaptive Mechanism Based on the Popularity of Scalable Sessions., , and . QofIS, volume 2511 of Lecture Notes in Computer Science, page 15-24. Springer, (2002)Q3M - QoS Architecture for Multi-user Mobile Multimedia Sessions in 4G systems., , , , , and . MMNS, volume 4787 of Lecture Notes in Computer Science, page 38-49. Springer, (2007)Describing the Internet of Things with an ontology: The SusCity project case study., , , , and . ICIN, page 294-299. IEEE, (2017)RAILoB - a Routing Algorithm for Inter-cluster Load Balancing in Wireless Mesh Networks., , , and . CCNC, page 904-909. IEEE, (2012)A Europe-Brazil Context for Secure Data Analytics in the Cloud., , , , , , and . IEEE Secur. Priv., 16 (6): 52-60 (2018)Current and Future Trends in Mobile Device Forensics: A Survey., , , and . ACM Comput. Surv., 51 (3): 46:1-46:31 (2018)