Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymity in Preference-Aware Location-based Services without Third Trusted-Party.. MobiQuitous, page 283-284. ICST / ACM, (2015)An interpretable semi-supervised system for detecting cyberattacks using anomaly detection in industrial scenarios., , , and . IET Inf. Secur., 17 (4): 553-566 (July 2023)ICE++: Improving Security, QoS, and High Availability of Medical Cyber-Physical Systems through Mobile Edge Computing., , , and . HealthCom, page 1-8. IEEE, (2018)What Private Information Are You Disclosing? A Privacy-Preserving System Supervised by Yourself., , , and . HPCC/CSS/ICESS, page 1221-1228. IEEE, (2014)Distributed Provision and Management of Security Services in Globus Toolkit 4., , , , and . OTM Conferences (2), volume 4276 of Lecture Notes in Computer Science, page 1325-1335. Springer, (2006)Collecting Experience Data from Remotely Hosted Learning Applications., , , , and . REV, 22, page 170-181. Springer, (2017)A privacy-preserving recommender system for mobile commerce.. CNS, page 725-726. IEEE, (2015)Bibliometric Analysis of the Last Ten Years of the European Conference on Technology-Enhanced Learning., , and . EC-TEL, volume 12884 of Lecture Notes in Computer Science, page 337-341. Springer, (2021)Self-Configuration of Grid Nodes Using a Policy-Based Management Architecture., , , and . International Conference on Computational Science, volume 3038 of Lecture Notes in Computer Science, page 158-165. Springer, (2004)SUSAN: A Deep Learning based anomaly detection framework for sustainable industry., , , and . Sustain. Comput. Informatics Syst., (January 2023)