From post

The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence.

, , , , , , и . CEC, стр. 1015-1021. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attributes and Dimensions of Trust in Secure Systems., , , и . IOT, стр. 179-186. ACM, (2022)FASER: Binary Code Similarity Search through the use of Intermediate Representations., , и . CAMLIS, том 3652 из CEUR Workshop Proceedings, стр. 193-202. CEUR-WS.org, (2023)The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence., , , , , , и . CEC, стр. 1015-1021. IEEE, (2016)Trust Trackers for Computation Offloading in Edge-Based IoT Networks., , и . INFOCOM, стр. 1-10. IEEE, (2021)ATHENA: A Pagerank-based Scheme to Solve the Thundering Herd in Authentication., , , , и . VNC, стр. 1-4. IEEE, (2018)Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things., , , , , и . ACM Trans. Sens. Networks, 18 (2): 29:1-29:41 (2022)A Novel Method for Extracting Knowledge from Neural Networks with Evolving SQL Queries., , и . ICANN (2), том 3697 из Lecture Notes in Computer Science, стр. 497-502. Springer, (2005)Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning., , , , , и . CoRR, (2023)Trust assessment in 32 KiB of RAM: multi-application trust-based task offloading for resource-constrained IoT nodes., , и . SAC, стр. 184-193. ACM, (2021)Problems with Using Genetic Algorithms for Neural Network Feature Selection., , и . ECAI, стр. 221-225. John Wiley and Sons, Chichester, (1994)