From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluating Federated Learning for Intrusion Detection in Internet of Things: Review and Challenges., , , , , , и . CoRR, (2021)Toward a Cybersecurity Certification Framework for the Internet of Things., , и . IEEE Secur. Priv., 17 (3): 66-76 (2019)Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges and Future Directions., , , , , , и . IEEE Secur. Priv., 19 (1): 12-23 (2021)Privacy-Preserving Solutions for Blockchain: Review and Challenges., , , , и . IEEE Access, (2019)Defining the Behavior of IoT Devices Through the MUD Standard: Review, Challenges, and Research Directions., , , , , , , и . IEEE Access, (2021)Mitigation of Privacy Threats due to Encrypted Traffic Analysis through a Policy-Based Framework and MUD Profiles., , , , и . Symmetry, 12 (9): 1576 (2020)Federated Cyberattack Detection for Internet of Things-Enabled Smart Cities., , , , и . Computer, 55 (12): 65-73 (2022)A digital envelope approach using attribute-based encryption for secure data exchange in IoT scenarios., , , , , и . GIoTS, стр. 1-6. IEEE, (2017)Certificateless and Privacy-Enhancing Group Sharing Mechanism for the Future Internet., , , и . IMIS, стр. 313-318. IEEE Computer Society, (2015)Managing Context Information for Adaptive Security in IoT Environments., , и . AINA Workshops, стр. 676-681. IEEE Computer Society, (2015)