Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Belief-theoretic Framework for the Collaborative Development and Integration of Para-consistent Conceptual Models, and . Journal of Systems and Software, (October 2008)A physical model of the low-frequency electrical polarization of clay rocks, , , , , , and . Journal of Geophysical Research, (2008)Internet of Things (IoT) security dataset evolution: Challenges and future directions., , , , , , , , and . Internet Things, (July 2023)Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing., , , , and . IEEE Internet Things J., 8 (14): 11758-11772 (2021)The state of the art in critical infrastructure protection: a framework for convergence., and . Int. J. Crit. Infrastructures, 4 (3): 215-244 (2008)Incremental communication for multilayer neural networks., and . IEEE Trans. Neural Networks, 6 (6): 1375-1385 (1995)Incremental communication for multilayer neural networks: error analysis., and . IEEE Trans. Neural Networks, 9 (1): 68-82 (1998)Evaluating Deep Learning-based NIDS in Adversarial Settings., , and . ICISSP, page 435-444. SCITEPRESS, (2022)RiskISM: A Risk Assessment Tool for Substations., , and . iSCI, page 23-30. IEEE, (2021)Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy., , , and . ICCST, page 1-8. IEEE, (2019)