Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A cross-domain qualitative meta-analysis of digital forensics: Research trends, challenges, and emerging topics., , , , , , , , and . CoRR, (2021)Compressing Time Series Towards Lightweight Integrity Commitments., , , , , , and . SEEDA-CECNSM, page 1-7. IEEE, (2023)Machine Learning for All: A More Robust Federated Learning Framework., and . ICISSP, page 544-551. SciTePress, (2019)Anomaly detection in IoT devices via monitoring of supply current., , , , and . ICCE-Berlin, page 1-4. IEEE, (2018)Security and Privacy in the Internet of Things Using Blockchain Technology., and . DCOSS, page 284-290. IEEE, (2019)Reducing false positives in intrusion detection systems., and . Comput. Secur., 29 (1): 35-44 (2010)Tracing Your Smart-Home Devices Conversations: A Real World IoT Traffic Data-Set., , , and . Sensors, 20 (22): 6600 (2020)Supply Current Monitoring for Anomaly Detection on IoT Devices., , and . PCI, page 9:1-9:2. ACM, (2017)Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection., , , , , and . COINS, page 172-178. ACM, (2019)Using Blockchains to Strengthen the Security of Internet of Things., , , , , , , , and . Euro-CYBERSEC, volume 821 of Communications in Computer and Information Science, page 90-100. Springer, (2018)