Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OntoHealth: a system to process ontologies applied to health pervasive environment., , , , , , , and . IJCSE, 10 (4): 359-367 (2015)URL query string anomaly sensor designed with the bidimensional Haar wavelet transform., , , , and . Int. J. Inf. Sec., 14 (6): 561-581 (2015)DoS attack detection using a two dimensional wavelet transform., , , , , and . CLEI, page 1-8. IEEE, (2012)An Ontology-based Security Framework for Decision-making in Industrial Systems., , , and . MODELSWARD, page 779-788. SciTePress, (2016)An Ontology-Based Cybersecurity Framework for the Internet of Things., , , , and . Sensors, 18 (9): 3053 (2018)Model Driven Implementation of Security Management Process., , and . MODELSWARD, page 229-238. SciTePress, (2017)Towards a reference ontology for security in the Internet of Things., , and . M&N, page 1-6. IEEE, (2015)An approach to automatic customization of user interfaces for mobile devices in pervasive environments., , , , , , and . CLEI, page 1-7. IEEE, (2012)The application of security adaptive framework for sensor in industrial systems., , , and . SAS, page 1-6. IEEE, (2016)A Model-Driven Adaptive Approach for IoT Security., , , and . MODELSWARD (Revised Selected Papers), volume 692 of Communications in Computer and Information Science, page 194-215. Springer, (2016)