Author of the publication

A Testbed for Trusted Telecommunications Systems in a Safety Critical Environment.

, , , , , , and . SAFECOMP Workshops, volume 11094 of Lecture Notes in Computer Science, page 87-98. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Per-sample Prediction Intervals for Extreme Learning Machines., , , and . CoRR, (2019)A Model for Metricising Privacy and Legal Compliance., , and . QUATIC, page 229-237. IEEE Computer Society, (2018)Methodology for Behavioral-based Malware Analysis and Detection Using Random Projections and K-Nearest Neighbors Classifiers., , , and . CIS, page 1016-1023. IEEE Computer Society, (2011)A Testbed for Trusted Telecommunications Systems in a Safety Critical Environment., , , , , , and . SAFECOMP Workshops, volume 11094 of Lecture Notes in Computer Science, page 87-98. Springer, (2018)Guest Editorial: Trust, Security and Privacy of 6G., , , , , and . IEEE Netw., 36 (4): 100-102 (2022)On the Development of a Metric for Quality of Information Content over Anonymised Data-Sets., and . QUATIC, page 185-190. IEEE Computer Society, (2016)Spiking Networks for Improved Cognitive Abilities of Edge Computing Devices., , , , , and . CoRR, (2019)Secure Keying Scheme for Network Slicing in 5G Architecture., , , , and . CSCN, page 1-6. IEEE, (2019)Incremental ELMVIS for unsupervised learning., , , , , , , and . CoRR, (2019)