Search for persons
X
?
Communications in Computer and Information Science; Ubiquitous Security ,
1
BiBERT-AV: Enhancing Authorship Verification Through Siames..:
, In:
?
Network and System Security; Lecture Notes in Computer Science ,
2
The Effectiveness of Transformer-Based Models for BEC Attac..:
, In:
?
2020 IEEE 6th World Forum on Internet of Things (WF-IoT) ,
5
A Secure Cloud Migration, Monitoring and Analytics Framewor..:
, In:
?
2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT) ,
6
A Seamless Cloud Migration Approach to Secure Distributed L..:
, In:
?
Critical Information Infrastructures Security; Lecture Notes in Computer Science ,
7
Intrusion Resilience for PV Inverters in a Distribution Gri..:
, In:
?
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy ,
10
Deep Android Malware Detection:
, In:
?
Proceedings of the 2015 Conference on research in adaptive and convergent systems ,
13