Author of the publication

Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems.

, , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial for special issue on security, trust, and privacy in internet of things: Challenges and solutions., , and . Int. J. Netw. Manag., (2021)Towards Intelligent Attack Detection Using DNA Computing., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (3s): 126:1-126:27 (2023)MLCT: A multi-level contact tracing scheme with strong privacy., , , and . Concurr. Comput. Pract. Exp., (2023)Threshold identity authentication signature: Impersonation prevention in social network services., , and . Concurr. Comput. Pract. Exp., (2022)NoSneaky: A Blockchain-Based Execution Integrity Protection Scheme in Industry 4.0., , and . IEEE Trans. Ind. Informatics, 19 (7): 7957-7965 (July 2023)Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks., , , , , and . IEEE Internet Things J., 11 (4): 6664-6676 (February 2024)User recognition based on periocular biometrics and touch dynamics., , , , and . Pattern Recognit. Lett., (2021)IEEE Access Special Section Editorial: Internet-of-Things Attacks and Defenses: Recent Advances and Challenges., , , , and . IEEE Access, (2021)WNV-Detector: automated and scalable detection of wireless network vulnerabilities., , , , , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 85 (2021)Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov)., , , and . Comput. Electr. Eng., (2020)