Author of the publication

A Knowledge-Based IoT Security Checker.

, , , , , and . Euro-Par Workshops, volume 11339 of Lecture Notes in Computer Science, page 299-311. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A polling access control with exhaustive service in wireless body area networks for mobile healthcare using the sleeping schema., , , , , , and . J. Ambient Intelligence and Humanized Computing, 10 (10): 3761-3774 (2019)Fast and robust Face Detection.. Multimedia Techniques for Device and Ambient Intelligence, Springer, (2009)An interval type-2 fuzzy active contour model for auroral oval segmentation., , , , and . Soft Comput., 21 (9): 2325-2345 (2017)Special issue on dense surveillance systems for urban traffic., , and . J. Intell. Transp. Syst., 24 (3): 217-220 (2020)Using incentive schemes to alleviate supply chain risks., , , , and . MEDES, page 221-228. ACM, (2010)A certification framework for cloud-based services., , , and . SAC, page 440-447. ACM, (2016)Object Counting in Remote Sensing via Triple Attention and Scale-Aware Network., , , and . Remote. Sens., 14 (24): 6363 (December 2022)A structure and texture revealing retinex model for low-light image enhancement., , , , and . Multim. Tools Appl., 83 (1): 2323-2347 (January 2024)A Multilayer Deep Learning Approach for Malware Classification in 5G-Enabled IIoT., , , and . IEEE Trans. Ind. Informatics, 19 (2): 1495-1503 (2023)Image super-resolution via enhanced multi-scale residual network., , , , , and . J. Parallel Distributed Comput., (2021)