Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Systematic Literature Review on AI Safety: Identifying Trends, Challenges, and Future Directions., , , and . IEEE Access, (2024)On the Impact of Inter-language Dependencies in Multi-language Systems., , , , and . QRS, page 509. IEEE, (2020)Private Blockchain Network for IoT Device Firmware Integrity Verification and Update., , and . HASE, page 164-170. IEEE, (2019)Blockchain Based Model for Consent Management and Data Transparency Assurance., , , and . QRS Companion, page 1050-1059. IEEE, (2021)Using Probabilistic Temporal Logic PCTL and Model Checking for Context Prediction., , , , and . Comput. Informatics, 37 (6): 1411-1442 (2018)A Data-Centric Approach for Safe and Secure Large Language Models against Threatening and Toxic Content., , and . CoRR, (April 2025)On Securing the Communication in IoT Infrastructure using Elliptic Curve Cryptography., , , , and . QRS Companion, page 758-759. IEEE, (2022)Analysis of Overhead Caused by Security Mechanisms in IaaS Cloud., , and . CoDIT, page 952-958. IEEE, (2018)Behavioral Study of Malware Affecting Financial Institutions and Clients., , , and . DASC/PiCom/CBDCom/CyberSciTech, page 79-86. IEEE, (2020)Serverless on Machine Learning: A Systematic Mapping Study., , and . IEEE Access, (2022)