Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attributes and Dimensions of Trust in Secure Systems., , , and . IOT, page 179-186. ACM, (2022)FASER: Binary Code Similarity Search through the use of Intermediate Representations., , and . CAMLIS, volume 3652 of CEUR Workshop Proceedings, page 193-202. CEUR-WS.org, (2023)The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence., , , , , , and . CEC, page 1015-1021. IEEE, (2016)Trust Trackers for Computation Offloading in Edge-Based IoT Networks., , and . INFOCOM, page 1-10. IEEE, (2021)ATHENA: A Pagerank-based Scheme to Solve the Thundering Herd in Authentication., , , , and . VNC, page 1-4. IEEE, (2018)Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things., , , , , and . ACM Trans. Sens. Networks, 18 (2): 29:1-29:41 (2022)A Novel Method for Extracting Knowledge from Neural Networks with Evolving SQL Queries., , and . ICANN (2), volume 3697 of Lecture Notes in Computer Science, page 497-502. Springer, (2005)Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning., , , , , and . CoRR, (2023)Trust assessment in 32 KiB of RAM: multi-application trust-based task offloading for resource-constrained IoT nodes., , and . SAC, page 184-193. ACM, (2021)Problems with Using Genetic Algorithms for Neural Network Feature Selection., , and . ECAI, page 221-225. John Wiley and Sons, Chichester, (1994)