Author of the publication

SecRiskAI: a Machine Learning-Based Approach for Cybersecurity Risk Prediction in Businesses.

, , , , , and . CBI (1), page 1-10. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BluePIL: a Bluetooth-based PassIve Localization Method., , , , , and . IM, page 28-36. IEEE, (2021)WeTrace - A Privacy-preserving Mobile COVID-19 Tracing Approach and Application., , , , , , , and . CoRR, (2020)SaCI: A Blockchain-Based Cyber Insurance Approach for the Deployment and Management of a Contract Coverage., , , , , and . GECON, volume 13072 of Lecture Notes in Computer Science, page 79-92. Springer, (2021)BUNKER: A Blockchain-based trUsted VNF pacKagE Repository., , , and . GECON, volume 11819 of Lecture Notes in Computer Science, page 188-196. Springer, (2019)GENEVIZ: A Visual Tool for the Construction and Blockchain-Based Validation of SFC Packages., , , , and . GECON, volume 11819 of Lecture Notes in Computer Science, page 15-28. Springer, (2019)Toward a Policy-based Blockchain Agnostic Framework., , and . IM, page 609-613. IFIP, (2019)SC-FLARE: Cooperative DDoS Signaling based on Smart Contracts., , , and . IEEE ICBC, page 1-3. IEEE, (2020)Real-time Medical Devices Inventory Tracking - a Hands-on Experience., , , and . NOMS, page 1-6. IEEE, (2023)PMD-Track: Portable Medical Devices' Real-time Inventory and Tracking., , , and . WONS, page 1-4. IEEE, (2022)Toward Mitigation-as-a-Service in Cooperative Network Defenses., , , , and . DASC/PiCom/DataCom/CyberSciTech, page 362-367. IEEE Computer Society, (2018)