2024
Drawing the Boundaries Between Blockchain and Blockchain-Like Systems: A Comprehensive Survey on Distributed Ledger Technologies.
Proc. IEEE, March, 2024
Machine learning in identity and access management systems: Survey and deep dive.
Comput. Secur., 2024
On Using Artificial Intelligence in Software Quality Assurance: A State of the Art.
Proceedings of the Eleventh Workshop on Software Quality Analysis, 2024
2023
IoT-Gov: A structured framework for internet of things governance.
Comput. Networks, September, 2023
GBTrust: Leveraging Edge Attention in Graph Neural Networks for Trust Management in P2P Networks.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Machine Learning based Identity and Access Management Systems (ML I&AM): a Taxonomy.
Proceedings of the 7th IEEE Congress on Information Science and Technology, 2023
A Transpilation-Based Approach to Writing Secure Access Control Smart Contracts.
Proceedings of the 5th Conference on Blockchain Research & Applications for Innovative Networks and Services, 2023
2022
A Privacy by Design Methodology Application in Telecom Domain.
Int. J. Commun. Networks Inf. Secur., April, 2022
BTrust: A New Blockchain-Based Trust Management Protocol for Resource Sharing.
J. Netw. Syst. Manag., 2022
IoT-Gov: an IoT governance framework using the blockchain.
Computing, 2022
Untangling the Overlap Between Blockchain and DLTs.
Proceedings of the Intelligent Computing, 2022
SOK: A Comprehensive Survey on Distributed Ledger Technologies.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022
Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Identity and Access Management Field: Challenges and State of the Art.
Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics, 2022
2021
DCEA: A Reference model for Distributed Ledger Technologies.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Exploring blockchain-based Self Sovereign Identity Systems: challenges and comparative analysis.
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021
2020
A Methodology for Assuring Privacy by Design in Information Systems.
Int. J. Commun. Networks Inf. Secur., 2020
Inadequacy of IT Approaches to Manage Cyber Security in ICS Context.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020
A Qualitative-Driven Study of Irreversible Data Anonymizing Techniques in Databases.
Proceedings of the SITA'20: Theories and Applications, 2020
2019
Toward a unified framework for Cloud Computing governance: An approach for evaluating and integrating IT management and governance models.
Comput. Stand. Interfaces, 2019
Cyber Security challenges and Issues of Industrial Control Systems-Some Security Recommendations.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019
2018
Privacy Enhancement of Telecom Processes Interacting with Charging Data Records.
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018
Privacy increase on telecommunication processes.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2018
2016
COBIT Evaluation as a Framework for Cloud Computing Governance.
Int. J. Cloud Appl. Comput., 2016
2015
Requirements definition for a holistic approach of cloud computing governance.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015
2014
Challenges for IT based cloud computing governance.
Proceedings of the 9th International Conference on Intelligent Systems: Theories and Applications, 2014
2012
A new architecture for detecting DDoS/brute forcing attack and destroying the botnet behind.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012
2005
Using Active Agent for Intrusion Detection and Management.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005