Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparative Study of the Common Cyber-physical Attacks in Industry 4.0., , , and . IINTEC, page 1-7. IEEE, (2019)Codesign of an IoT Using a Metaheuristic IP., , , and . IINTEC, page 153-157. IEEE, (2018)Performance Evaluation of Particles Coding in Particle Swarm Optimization with Self-adaptive Parameters for Flexible Job Shop Scheduling Problem., and . IEA/AIE, volume 10868 of Lecture Notes in Computer Science, page 396-407. Springer, (2018)A Survey on Intrusion Detection Systems for IoT Networks Based on Long Short-Term Memory., , and . MEDI Workshops, volume 2071 of Communications in Computer and Information Science, page 237-250. Springer, (2023)Prolog on a RISC: Implementation and evaluation., and . Microprocessing and Microprogramming, 32 (1-5): 497-504 (1991)Self-adaptative Early Warning Scoring System for Smart Hospital., , , and . ICOST, volume 12157 of Lecture Notes in Computer Science, page 16-27. Springer, (2020)Secure data outsourcing in presence of the inference problem: issues and directions., , and . J. Inf. Telecommun., 5 (1): 16-34 (2021)A Survey Study on the Inference Problem in Distributed Environment (S)., , and . SEKE, page 113-152. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)Threat Modeling with Mitre ATT&CK Framework Mapping for SD-IOT Security Assessment and Mitigations., , and . ISCC, page 1323-1326. IEEE, (2023)A Hybrid Machine Learning Approach for Automatic Experts Recommendation Systems., , , , , and . INISTA, page 1-6. IEEE, (2023)