Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards the autonomous provision of self-protection capabilities in 5G networks., , , and . J. Ambient Intell. Humaniz. Comput., 10 (12): 4707-4720 (2019)Eight Reasons Why Cybersecurity on Novel Generations of Brain-Computer Interfaces Must Be Prioritized., , and . CoRR, (2021)Eight Reasons to Prioritize Brain-Computer Interface Cybersecurity., , and . Commun. ACM, 66 (4): 68-78 (2023)A Scalable Architecture for the Dynamic Deployment of Multimodal Learning Analytics Applications in Smart Classrooms., , , , , and . Sensors, 20 (10): 2923 (2020)AuthCODE: A privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning., , , and . Comput. Secur., (2021)Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments., , , , , and . Sensors, 19 (5): 1114 (2019)Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments., , , and . Peer-to-Peer Netw. Appl., 14 (5): 2719-2734 (2021)Creation of a Dataset Modeling the Behavior of Malware Affecting the Confidentiality of Data Managed by IoT Devices., , , , , and . Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, volume 1030 of Studies in Computational Intelligence, Springer, (2022)AuthCODE: A Privacy-preserving and Multi-device Continuous Authentication Architecture based on Machine and Deep Learning., , , and . CoRR, (2020)Early Detection of Cryptojacker Malicious Behaviors on IoT Crowdsensing Devices., , , , , , and . NOMS, page 1-8. IEEE, (2023)