Author of the publication

Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research.

, , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formalizing electrocardiogram (ECG) signal behavior in event-B., , and . Healthcom, page 55-60. IEEE, (2014)A verification methodology for a wireless body sensor network functionality., , and . BHI, page 635-639. IEEE, (2014)Identifying Applications' State via System Calls Activity: A Pipeline Approach., , , and . ICECS, page 1-6. IEEE, (2021)Efficient low cost supervisory system for Internet of Things enabled smart home., , , , and . ICC Workshops, page 864-869. IEEE, (2017)A Novel Grayscale Image Encryption Scheme Based on the Block-Level Swapping of Pixels and the Chaotic System., , , , , , , , and . Sensors, 22 (16): 6243 (2022)Drones network security enhancement using smart based block-chain technology., , , , and . ICCR, page 1-6. IEEE, (2022)A Cyber-Security Framework For Boiler of Steam Power Plant Using Simulation Data to Train Machine Learning Model., , , and . ICCR, page 1-9. IEEE, (2022)Simulation Framework for a Security Protocol for Wireless Body Sensor Networks., , and . LCN Workshops, page 248-253. IEEE Computer Society, (2016)Extended abstract: Theorem proving verification of privacy in WBSN for healthcare systems., , and . ICECS, page 100-101. IEEE, (2013)Digital Forensic Analysis of Files Using Deep Learning., , , and . ICSPIS, page 1-4. IEEE, (2020)