Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bio-inspired Approach to Thwart Against Insider Threats: An Access Control Policy Regulation Framework., , , and . BICT, volume 289 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 39-57. Springer, (2019)Cyber Regulatory Networks: Towards a Bio-inspired Auto-resilient Framework for Cyber-Defense., , and . BICT, volume 289 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 156-174. Springer, (2019)Optimal Feature-Centric Approach for EEG-Based Human Emotion Identification., , , , , and . ICACS, page 1-6. IEEE, (2024)A Survey on COVID-19 Data Analysis Using AI, IoT, and Social Media., , , , , and . Sensors, 23 (12): 5543 (2023)Cyber Resilience-by-Construction: Modeling, Measuring & Verifying., , and . SafeConfig@CCS, page 9-14. ACM, (2015)EEG-Based Depression Detection: A Temporal Domain Feature-Centric Machine Learning Approach., , , , and . FIT, page 208-213. IEEE, (2023)Formal Approach for Resilient Reachability based on End-System Route Agility., , , , , and . MTD@CCS, page 117-127. ACM, (2016)An EEG-Driven Framework for Emotion Recognition During Gameplay., , , , , and . ICACS, page 1-6. IEEE, (2024)Uncertainty cost analysis of heterogeneous wireless network based on loan repayment approach., , , and . ICAIT, page 170-175. IEEE, (2017)Radio Network Forensic with mmWave Using the Dominant Path Algorithm., , , , , , and . Secur. Commun. Networks, (2022)