Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classifying Security Attacks in IoT Networks Using Supervised Learning., and . DCOSS, page 652-658. IEEE, (2019)Experimentation with Local Intrusion Detection in IoT Networks Using Supervised Learning., and . DCOSS, page 423-428. IEEE, (2020)Evaluating Local Intrusion Detection in the Internet of Things., and . MedComNet, page 1-6. IEEE, (2021)Decentralized Dedicated Intrusion Detection Security Agents for IoT Networks., , and . DCOSS, page 414-419. IEEE, (2021)An Intrusion Detection System for Wireless Sensor Networks., , and . ICT, page 1-5. IEEE, (2017)The Impact of Network Layer Attacks in Wireless Sensor Networks., and . SIoT, page 20-28. IEEE Computer Society, (2016)An Intrusion Detection System for Constrained WSN and IoT Nodes Based on Binary Logistic Regression., and . MSWiM, page 259-263. ACM, (2018)Competition: Dynamic Alternative Path Selection in Wireless Sensor Networks., , , , , and . EWSN, page 276-277. Junction Publishing, Canada / ACM, (2017)System for Operational Technology Attack Detection in Industrial IoT., , and . MedComNet, page 84-93. IEEE, (2022)Energy Efficient Mechanism for Reusing Mobile Nodes in WSN and IoT Networks., , , , and . DCOSS, page 287-294. IEEE, (2021)