Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Demystifying machine learning models of massive IoT attack detection with Explainable AI for sustainable and secure future smart cities., , , , , and . Internet Things, (December 2023)DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things., , , , , , and . Internet Things, (October 2023)Efficient Big Data Clustering., , , and . IDEAS, page 103-109. ACM, (2018)Distributed computing by leveraging and rewarding idling user resources from P2P networks., , , , and . J. Parallel Distributed Comput., (2018)An advanced data fabric architecture leveraging homomorphic encryption and federated learning., , , , , , , , and . Inf. Fusion, (February 2024)Editorial: Security and privacy for the Internet of Things., , and . Frontiers Comput. Sci., (2023)Neural Network based Temporal Point Processes for Attack Detection in Industrial Control Systems., , , and . CSR, page 221-226. IEEE, (2022)A Peer to Peer Approach to Efficient High Performance Computing., , , , , and . PDP, page 539-542. IEEE Computer Society, (2017)Activity Daily Living prediction with Marked Temporal Point Processes (Discussion Paper)., , , , and . SEBD, volume 2994 of CEUR Workshop Proceedings, page 387-394. CEUR-WS.org, (2021)Efficient High Performance Computing by user networks., , , , , and . SEBD, volume 2037 of CEUR Workshop Proceedings, page 309. CEUR-WS.org, (2017)