Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks., , , , , and . IEEE Internet Things J., 5 (4): 2496-2505 (2018)A Blockchain Based Forensic System for IoT Sensors using MQTT Protocol., , , , and . IOTSMS, page 1-8. IEEE, (2022)Towards an Evaluation Framework for Extended Reality Authentication Schemes., , and . CHI Extended Abstracts, page 339:1-339:6. ACM, (2024)Anonymity networks and the fragile cyber ecosystem., , and . Netw. Secur., 2016 (3): 10-18 (2016)Super Learner Ensemble for Anomaly Detection and Cyber-Risk Quantification in Industrial Control Systems., , , and . IEEE Internet Things J., 9 (15): 13279-13297 (2022)Corrections to "Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security"., , , , , and . IEEE Trans. Engineering Management, 67 (3): 979 (2020)Digital twins in cyber effects modelling of IoT/CPS points of low resilience., , , , and . Simul. Model. Pract. Theory, (May 2023)Science Technology Ontology: A Taxonomy of Emerging Topics., , , , and . TEXT2KG/BiKE@ESWC, volume 3447 of CEUR Workshop Proceedings, page 101-117. CEUR-WS.org, (2023)Distributed Filesystem Forensics: Ceph as a Case Study., , , , , , and . Handbook of Big Data and IoT Security, Springer, (2019)A BERT-based Empirical Study of Privacy Policies' Compliance with GDPR., , , , and . CNS, page 1-6. IEEE, (2023)