From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication., , , , , и . TrustCom, стр. 1119-1126. IEEE, (2020)Deep Learning-Based Intrusion Detection for IoT Networks., , , , , и . PRDC, стр. 256-265. IEEE, (2019)Traceability in supply chains: A Cyber security analysis., , , и . Comput. Secur., (2022)Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol., , , и . iThings/GreenCom/CPSCom/SmartData, стр. 748-755. IEEE Computer Society, (2017)Future challenges for smart cities: Cyber-security and digital forensics., , , , , , , , , и 2 other автор(ы). Digit. Investig., (2017)Zero Trust Architecture (ZTA): A Comprehensive Survey., , , , , и . IEEE Access, (2022)Identifying network traffic features suitable for honeynet data analysis., , , и . CCECE, стр. 1044-1048. IEEE, (2011)LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)., , , , , и . Comput. Secur., (2021)An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic., , , и . CW, стр. 23-30. IEEE Computer Society, (2011)A reliable peer-to-peer protocol for mobile Ad-Hoc wireless networks., , и . AICCSA, стр. 32-37. IEEE Computer Society, (2011)