Author of the publication

Using casual reasoning for anomaly detection among ECG live data streams in ubiquitous healthcare monitoring systems.

, , , , , and . J. Ambient Intelligence and Humanized Computing, 10 (10): 4085-4097 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threats to critical infrastructure from AI and human intelligence., , , and . J. Supercomput., 74 (10): 4865-4866 (2018)Correction to: A security review of local government using NIST CSF: a case study., , , and . J. Supercomput., 75 (9): 6158 (2019)Parallel query execution over encrypted data in database-as-a-service (DaaS)., , , , , , , and . J. Supercomput., 75 (4): 2269-2288 (2019)A Survey of Big Data Security Solutions in Healthcare., , , , and . SecureComm (2), volume 255 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 391-406. Springer, (2018)Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations., , , , , , , , and . IEEE Access, (2019)Security and privacy based access control model for internet of connected vehicles., , , , , , , and . Future Gener. Comput. Syst., (2019)POStCODE Middleware for Post-Market Surveillance of Medical Devices for Cyber Security in Medical and Healthcare Sector in Australia., , , , and . ISMICT, page 1-10. IEEE, (2018)Using casual reasoning for anomaly detection among ECG live data streams in ubiquitous healthcare monitoring systems., , , , , and . J. Ambient Intelligence and Humanized Computing, 10 (10): 4085-4097 (2019)A bio-inspired secure IPv6 communication protocol for Internet of Things., , , and . ICST, page 1-6. IEEE, (2017)Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting., , and . CoRR, (2019)