Author of the publication

Science Technology Ontology: A Taxonomy of Emerging Topics.

, , , , and . TEXT2KG/BiKE@ESWC, volume 3447 of CEUR Workshop Proceedings, page 101-117. CEUR-WS.org, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive and Optimum Secret Key Establishment for Secure Vehicular Communications., , , , and . IEEE Trans. Veh. Technol., 70 (3): 2310-2321 (2021)Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks., , , , , and . IEEE Internet Things J., 5 (4): 2496-2505 (2018)Physical characteristics of wireless communication channels for secret key establishment: A survey of the research., , , , and . Comput. Secur., (2018)Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors., , and . Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, Elsevier, (2017)A Blockchain Based Forensic System for IoT Sensors using MQTT Protocol., , , , and . IOTSMS, page 1-8. IEEE, (2022)Towards an Evaluation Framework for Extended Reality Authentication Schemes., , and . CHI Extended Abstracts, page 339:1-339:6. ACM, (2024)Adaptive Traffic Fingerprinting for Darknet Threat Intelligence., , , and . CoRR, (2018)Security in Online Games: Current Implementations and Challenges., , , , and . Handbook of Big Data and IoT Security, Springer, (2019)Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments., , , , , and . Ad Hoc Networks, (2019)Super Learner Ensemble for Anomaly Detection and Cyber-Risk Quantification in Industrial Control Systems., , , and . IEEE Internet Things J., 9 (15): 13279-13297 (2022)