Personensuche
X
?
2024 IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) ,
1
Survey and Experimentation to Compare IoT Device Model Iden..:
, In:
?
Advanced Information Networking and Applications; Lecture Notes on Data Engineering and Communications Technologies ,
2
Extension of Resource Authorization Method with SSI in Edge..:
, In:
?
2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC) ,
3
A Graph Construction Method for Anomalous Traffic Detection..:
, In:
?
Engineering Cyber-Physical Systems and Critical Infrastructures; Advances in Engineering and Information Science Toward Smart City and Beyond ,
4
Smart City Security Based on a Meta-Security Framework for ..:
, In:
?
Advanced Information Networking and Applications; Lecture Notes in Networks and Systems ,
5
Application of Generalized Deduplication Techniques in Edge..:
, In:
?
2023 IEEE 13th International Conference on Consumer Electronics - Berlin (ICCE-Berlin) ,
6
A Client-Side Evil-Twin Attack Detection System with Thresh..:
, In:
?
Advanced Information Networking and Applications; Lecture Notes in Networks and Systems ,
8
Resource Authorization Methods for Edge Computing:
, In:
?
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) ,
9
Identification of an IoT Device Model in the Home Domain Us..:
, In:
?
GLOBECOM 2022 - 2022 IEEE Global Communications Conference ,
10
Anomaly Traffic Detection with Federated Learning toward Ne..:
, In:
?
Advanced Information Networking and Applications; Lecture Notes in Networks and Systems ,
13
SeBeST: Security Behavior Stage Model and Its Application t..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
15