Author of the publication

Event Detection Through Differential Pattern Mining in Cyber-Physical Systems.

, , , , , and . IEEE Trans. Big Data, 6 (4): 652-665 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber Security in Social Media: Challenges and the Way Forward., , and . IT Prof., 21 (2): 41-49 (2019)A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration., , , and . SpaCCS Workshops, volume 10658 of Lecture Notes in Computer Science, page 581-592. Springer, (2017)TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System., , , , , , , and . IEEE Trans. Ind. Informatics, 16 (5): 3311-3321 (2020)Secure and efficient data delivery for fog-assisted wireless body area networks., , , and . Peer-to-Peer Netw. Appl., 12 (5): 1289-1307 (2019)Hardware design and modeling of lightweight block ciphers for secure communications., , , , and . Future Gener. Comput. Syst., (2018)Defining Metrics for Comparing Threat Intelligence Solutions Through the Lens of the Analyst., and . UEMCON, page 192-199. IEEE, (2023)CAre: Certificate Authority Rescue Engine for Proactive Security., , and . ISPAN-FCST-ISCC, page 79-86. IEEE Computer Society, (2017)Reevaluating the effectiveness of visual cues for website security., and . UEMCON, page 451-457. IEEE, (2017)Security and privacy issues affecting cloud-based IP camera., and . UEMCON, page 458-465. IEEE, (2017)Security issues with certificate authorities., and . UEMCON, page 449-455. IEEE, (2017)