Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AI-Driven Container Security Approaches for 5G and Beyond: A Survey., , , and . CoRR, (2023)A Novel SDN Dataset for Intrusion Detection in IoT Networks., and . CNSM, page 1-5. IEEE, (2020)A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing., , , and . SRDS Workshop, page 31-35. IEEE Computer Society, (2015)A Mobile-Cloud Collaborative Traffic Lights Detector for Blind Navigation., , and . Mobile Data Management, page 396-401. IEEE Computer Society, (2010)An MTD-Based Self-Adaptive Resilience Approach for Cloud Systems., , , , , , and . CLOUD, page 723-726. IEEE Computer Society, (2017)Adaptable Safety and Security in V2X Systems., , and . ICIOT, page 17-24. IEEE Computer Society, (2017)An End-to-End Security Auditing Approach for Service Oriented Architectures., , , , , , , and . SRDS, page 279-284. IEEE Computer Society, (2012)An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing., , , , , , and . SRDS, page 177-183. IEEE Computer Society, (2010)Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks., , , , , and . SRDS Workshop, page 57-61. IEEE Computer Society, (2015)Machine Learning Models to Enhance the Science of Cognitive Autonomy., , , , , and . AIKE, page 46-53. IEEE Computer Society, (2018)