Author of the publication

Controlled Android Application Execution for the IoT Infrastructure.

, , , , and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 16-26. (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancement of Healthcare Data Performance Metrics using Neural Network Machine Learning Algorithms., , , and . CoRR, (2022)Towards Effective Algorithms for Intelligent Defense Systems., and . CSS, volume 7672 of Lecture Notes in Computer Science, page 498-508. Springer, (2012)A Comparative Study of ML-ELM and DNN for Intrusion Detection., , and . ACSW, page 1:1-1:7. ACM, (2021)Secure Fingerprint Authentication with Homomorphic Encryption., , , , and . DICTA, page 1-6. IEEE, (2020)Security Aspects of Military Sensor-Based Defence Systems., and . TrustCom/ISPA/IUCC, page 302-309. IEEE Computer Society, (2013)Controlled Android Application Execution for the IoT Infrastructure., , , , and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 16-26. (2015)Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One., , and . IEEE Trans. Inf. Forensics Secur., 12 (7): 1625-1636 (2017)Detection of Induced False Negatives in Malware Samples., and . PST, page 1-6. IEEE, (2021)A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results., , , and . HAISA, volume 658 of IFIP Advances in Information and Communication Technology, page 228-239. Springer, (2022)A linear convolution-based cancelable fingerprint biometric authentication system., , , , and . Comput. Secur., (2022)