Search for persons
X
?
2023 Joint Conference of the European Frequency and Time Forum and IEEE International Frequency Control Symposium (EFTF/IFCS) ,
1
Environmental Effects and Control Systems for GPS-Disciplin..:
, In:
?
2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC) ,
2
Toward a Design of User's Consent Tool for IoT-based Health..:
, In:
?
HCI for Cybersecurity, Privacy and Trust; Lecture Notes in Computer Science ,
3
Privacy Awareness Among Users of Digital Healthcare Service..:
, In:
?
2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA) ,
4
Enhanced Scanning in SDN Networks and its Detection using M..:
, In:
?
Civil Society in the Age of Monitory Democracy ,
5
Chapter 2 CIVIL SOCIETY IN THE AGE OF CRISIS:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
6
Privacy-Aware Split Learning Based Energy Theft Detection f..:
, In:
?
2022 IEEE 25th International Conference on Computational Science and Engineering (CSE) ,
7
Neural Network Approximation of Simulation-based IDS Fitnes..:
, In:
?
Proceedings of the Future Technologies Conference (FTC) 2022, Volume 2; Lecture Notes in Networks and Systems ,
8
On Optimal Configuration of IDS for RPL Resource-Constraine..:
, In:
?
2022 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI) ,
9
Transfer Learning Approach to Discover IDS Configurations U..:
, In:
?
The 21st Century Industrial Robot: When Tools Become Collaborators; Intelligent Systems, Control and Automation: Science and Engineering ,
10
Challenges in the Safety-Security Co-Assurance of Collabora..:
, In:
?
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
11
Reinforcement-Learning-based IDS for 6LoWPAN:
, In:
?
Active Building Energy Systems; Green Energy and Technology ,
12
Cybersecurity Roadmap for Active Buildings:
, In:
?
Lecture Notes in Computer Science; Emerging Technologies for Authorization and Authentication ,
13
Mimicry Attacks Against Behavioural-Based User Authenticati..:
, In:
?
Proceedings of the 16th International Conference on Availability, Reliability and Security ,
14
Continuous User Authentication for Human-Robot Collaboratio:
, In:
?
Innovative Security Solutions for Information Technology and Communications; Lecture Notes in Computer Science ,
15