Author of the publication

Shortfall-Based Optimal Security Provisioning for Internet of Things.

, , , and . ICDCS, page 2585-2586. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pareto Optimal Security Resource Allocation for Internet of Things., , , and . ACM Trans. Priv. Secur., 20 (4): 15:1-15:30 (2017)A multi-perspective approach for the analysis of complex business processes behavior., , , and . Expert Syst. Appl., (2021)Machine learning methods for generating high dimensional discrete datasets., , , , and . WIREs Data Mining Knowl. Discov., (2022)DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems., , , and . CODASPY, page 29-38. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..Predicting RNA Mutation Effects through Machine Learning of High-Throughput Ribozyme Experiments (Student Abstract)., , , , , , and . AAAI, page 12985-12986. AAAI Press, (2022)An Effective and Efficient Graph Representation Learning Approach for Big Graphs., , , , and . SEBD, volume 2994 of CEUR Workshop Proceedings, page 140-149. CEUR-WS.org, (2021)A Few Shot Transfer Learning Approach Identifying Private Images With Fast User Personalization., , , and . IEEE BigData, page 1204-1213. IEEE, (2021)Framework for Detecting Control Command Injection Attacks on Industrial Control Systems (ICS)., , and . CANDAR, page 211-217. IEEE, (2019)Inferring Bad Entities Through the Panama Papers Network., , and . ASONAM, page 767-773. IEEE Computer Society, (2018)Count Constraints for Inverse OLAP and Aggregate Data Exchange., , and . SEBD, page 27-34. Edizioni Libreria Progetto, Padova, Italy, (2012)