Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns., , , , and . Eng. Appl. Artif. Intell., 123 (Part B): 106344 (2023)Forensic analysis of the Xiaomi Mi Smart Sensor Set., , , and . Digit. Investig., (2022)An instrumentation based algorithm for stack overflow detection., , , and . J. Comput. Virol. Hacking Tech., 16 (3): 245-256 (2020)Integrating the edge computing paradigm into the development of IoT forensic methodologies., and . Int. J. Inf. Sec., 23 (2): 1093-1116 (April 2024)A context-centered methodology for IoT forensic investigations., , , and . Int. J. Inf. Sec., 20 (5): 647-673 (2021)Attack Pattern Recognition in the Internet of Things using Complex Event Processing and Machine Learning., , , , and . SMC, page 1919-1926. IEEE, (2021)A MEC-IIoT intelligent threat detector based on machine learning boosted tree algorithms., , , , and . Comput. Networks, (September 2023)A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents., , , and . Comput. J., 67 (4): 1324-1345 (2024)Developing an IoT forensic methodology. A concept proposal., , , and . Digit. Investig., (2021)MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats., , , and . J. Supercomput., 79 (11): 11895-11933 (2023)