Author of the publication

SecRiskAI: a Machine Learning-Based Approach for Cybersecurity Risk Prediction in Businesses.

, , , , , and . CBI (1), page 1-10. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling of P2P-based Video Streaming, and . Joint EC-GIN, EMANICS, and SmoothIT Workshop Economic Traffic Management, Zurich, Switzerland, (August 2008)Design and implementation of an integrated accounting architecture for distributed UMTS and WLAN networks., , and . Int. J. Wirel. Mob. Comput., 2 (4): 275-287 (2007)Design and Evaluation of an SDR-based LoRa Cloud Radio Access Network., , and . WiMob, page 1-7. IEEE, (2020)Privacy-Preserving and Syscall-Based Intrusion Detection System for IoT Spectrum Sensors Affected by Data Falsification Attacks., , , , , and . IEEE Internet Things J., 10 (10): 8408-8415 (May 2023)Sentinel: An Aggregation Function to Secure Decentralized Federated Learning., , , , , and . CoRR, (2023)Dynamic Virtual Organizations as Enablers for Managed Invisible Grids., , and . NOMS, IEEE, (2006)An SLA Support System for Cloud Computing., and . AIMS, volume 6734 of Lecture Notes in Computer Science, page 53-56. Springer, (2011)Token-Based Payment in Dynamic SAML-Based Federations., and . AIMS, volume 5127 of Lecture Notes in Computer Science, page 185-189. Springer, (2008)SCRIPT: A framework for Scalable Real-time IP Flow Record Analysis., , and . NOMS, page 278-285. IEEE, (2010)Monitoring of SLA compliances for Hosted Streaming Services., , and . Integrated Network Management, page 251-258. IEEE, (2009)