From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Data-driven framework and experimental validation for security monitoring of networked systems.. Birmingham City University, UK, (2022)British Library, EThOS.A survey on blockchain technology in the maritime industry: Challenges and future perspectives., , , , , , , , , и . Future Gener. Comput. Syst., (2024)Enhancing Sniffing Detection in IoT Home Wi-Fi Networks: An Ensemble Learning Approach With Network Monitoring System (NMS)., , , , и . IEEE Access, (2024)Enhancing Security Awareness Through Gamified Approaches., , , , , и . CoRR, (2024)Aggregation of security metrics for decision making: a reference architecture., , и . ECSA (Companion), стр. 53:1-53:7. ACM, (2018)Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution., , , и . Comput., 13 (7): 163 (июля 2024)Cyber Incident Scenarios in the Maritime Industry: Risk Assessment and Mitigation Strategies., , , , и . CSR, стр. 194-199. IEEE, (2023)Cybersecurity Metrics for Enhanced Protection of Healthcare IT Systems., , и . ISMICT, стр. 1-9. IEEE, (2019)Effective combining of feature selection techniques for machine learning-enabled IoT intrusion detection., , , , , и . Multim. Tools Appl., 80 (20): 31381-31399 (2021)Zunna - The Browser Extension for Protecting Personal Data., , , и . KSEM (5), том 14888 из Lecture Notes in Computer Science, стр. 203-213. Springer, (2024)