Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A probabilistic sampling method for efficient flow-based analysis., , , and . J. Commun. Networks, 18 (5): 818-825 (2016)A Fog-Based Security Framework for Large-Scale Industrial Internet of Things Environments., , , and . CoRR, (2022)A Drone-Based Building Inspection System Using Software-Agents., , and . IDC, volume 737 of Studies in Computational Intelligence, page 115-121. Springer, (2017)A Democratically Anonymous and Trusted Architecture for CTI Sharing using Blockchain., , , , and . ICCCN, page 1-7. IEEE, (2022)Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm., , , and . ICDCS Workshops, page 76-81. IEEE Computer Society, (2013)Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control., , , and . IEEE Trans. Ind. Informatics, 18 (6): 3734-3743 (2022)Addressing Adversarial Machine Learning Attacks in Smart Healthcare Perspectives., , and . CoRR, (2021)The Role of Cyber Threat Intelligence Sharing in the Metaverse., , , and . IEEE Internet Things Mag., 6 (1): 154-160 (March 2023)A Conceptual Trust Management Framework under Uncertainty for Smart Vehicular Networks., , , and . INFOCOM Workshops, page 1-7. IEEE, (2022)Design and Development of Automated Threat Hunting in Industrial Control Systems., , , , , , and . PerCom Workshops, page 618-623. IEEE, (2022)