Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Services Using Blockchains: A State of the Art Survey., , , , and . CoRR, (2018)Potential Data Link Candidates for Civilian Unmanned Aircraft Systems: A Survey., , and . CoRR, (2019)Estimating the number of sources in white Gaussian noise: simple eigenvalues based approaches., , , , , and . IET Signal Process., 11 (6): 663-673 (2017)Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach., , , , , and . Appl. Soft Comput., (2022)Safety Score as an Evaluation Metric for Machine Learning Models of Security Applications., , , and . IEEE Netw. Lett., 2 (4): 207-211 (2020)HYPER-VINES: A HYbrid Learning Fault and Performance Issues ERadicator for Virtual NEtwork Services over Multi-Cloud Systems., , , , , and . ICNC, page 141-147. IEEE, (2019)Probabilistic Blockchains: A Blockchain Paradigm for Collaborative Decision-Making., , and . UEMCON, page 457-465. IEEE, (2018)Experiments with a LoRaWAN-Based Remote ID System for Locating Unmanned Aerial Vehicles (UAVs)., , and . CoRR, (2020)Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security., , , , , and . IEEE Internet Things J., 8 (11): 8707-8718 (2021)Potential Data Link Candidates for Civilian Unmanned Aircraft Systems: A Survey., , and . IEEE Commun. Surv. Tutorials, 22 (1): 292-319 (2020)