Author of the publication

FedTIU: Securing Virtualized PLCs Against DDoS Attacks Using a Federated Learning Enabled Threat Intelligence Unit.

, , , and . SMARTCOMP, page 233-236. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Web-Based System for Transformer Design., and . KES, volume 2773 of Lecture Notes in Computer Science, page 715-721. Springer, (2003)Distributed ACO Based Reputation Management in Crowdsourcing., , and . IDCS, volume 11874 of Lecture Notes in Computer Science, page 379-390. Springer, (2019)Proceedings of the 1st International Workshop on Engineering Semantic Enterprise (ESE) 2012., , , and . WISE Workshops, volume 7652 of Lecture Notes in Computer Science, page 131-132. Springer, (2012)Measuring semantic distance for linked open data-enabled recommender systems., and . SAC, page 315-320. ACM, (2016)A Demo of a Software Platform for Ubiquitous Big Data Engineering, Visualization, and Analytics, via Reconfigurable Micro-Services, in Smart Factories., , and . SMARTCOMP, page 1-3. IEEE, (2022)Enabling Machine Learning on the Edge Using SRAM Conserving Efficient Neural Networks Execution Approach., , , and . ECML/PKDD (5), volume 12979 of Lecture Notes in Computer Science, page 20-35. Springer, (2021)A Semantic Model for E-Participation., , and . EGOV/ePart Ongoing Research, volume P-221 of LNI, page 258-259. GI, (2013)PROFILES & DATA: SEARCH International Workshop on Profiling and Searching Data on the Web Chairs' Welcome & Organization., , , , , , and . WWW (Companion Volume), page 1479-1480. ACM, (2018)Privacy-Preserving Energy Trade Using Double Auction in Blockchain Offline Channels., , and . BLOCKCHAIN, volume 595 of Lecture Notes in Networks and Systems, page 289-302. Springer, (2022)Identification of False Stealthy Data Injection Attacks in Smart Meters Using Machine Learning and Blockchain., , , , and . BLOCKCHAIN, volume 595 of Lecture Notes in Networks and Systems, page 398-409. Springer, (2022)