Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Blockchain Based Forensic System for IoT Sensors using MQTT Protocol., , , , and . IOTSMS, page 1-8. IEEE, (2022)Towards an Evaluation Framework for Extended Reality Authentication Schemes., , and . CHI Extended Abstracts, page 339:1-339:6. ACM, (2024)Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors., , and . CoRR, (2017)Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks., , , , , and . IEEE Internet Things J., 5 (4): 2496-2505 (2018)Security in Online Games: Current Implementations and Challenges., , , , and . Handbook of Big Data and IoT Security, Springer, (2019)Anonymity networks and the fragile cyber ecosystem., , and . Netw. Secur., 2016 (3): 10-18 (2016)Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments., , , , , and . Ad Hoc Networks, (2019)Super Learner Ensemble for Anomaly Detection and Cyber-Risk Quantification in Industrial Control Systems., , , and . IEEE Internet Things J., 9 (15): 13279-13297 (2022)Corrections to "Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security"., , , , , and . IEEE Trans. Engineering Management, 67 (3): 979 (2020)Cyberstalking: Investigating formal intervention and the role of Corporate Social Responsibility., , , , and . Telematics Informatics, 34 (4): 339-349 (2017)