Author of the publication

Security and Vulnerability of Extreme Automation Systems: The IoMT and IoA Case Studies.

, and . IT Prof., 21 (4): 48-55 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Life Sciences Computing Guest editors' introduction., , and . IT Prof., 16 (4): 21-23 (2014)Problem Oriented Medical Translational Services based on GraphQL Connectivity., , and . ICC, page 3844-3849. IEEE, (2022)Problem-Oriented Translational Health Informatics for Evidence Based Medicine and Privacy Enhancing., and . BigDataService, page 210-214. IEEE, (2023)Developing a collaborative virtual learning model for ubiquitous P2P grids., and . CSCWD (2), page 996-1001. IEEE Computer Society, (2005)1-84600-002-5.Establishment of a mindmap for medical e-Diagnosis as a service for graph-based learning and analytics., and . Neural Comput. Appl., 35 (22): 16089-16100 (August 2023)Extreme Automation: A New Game-Changing Technology.. IT Prof., 20 (2): 88-90 (2018)Securing AJAX-enriched mobile environment for exchanging SVG-based learning materials., , , and . ICDIM, page 472-477. IEEE, (2010)A Semantic Approach for Web Widget Mashup., , and . ICSOFT (1), page 178-184. SciTePress, (2011)Learning Cataract Severity Using the Contrast Sensetivity Scale: A Thick Data Approach., and . IEEE Big Data, page 4875-4880. IEEE, (2023)Designing a Vortal for Detecting Java Programs Cyberplagiarism., , and . International Conference on Internet Computing, page 252-256. CSREA Press, (2003)