Browsing by Author "Sauveron, Damien"
Now showing 1 - 6 of 6
- Results Per Page
- Sort Options
Item CO-TSM: A Flexible Model for Secure Embedded Device Ownership and Management(2024-10-08) Markantonakis, Konstantinos; Arfaoui, Ghada; Ghazalah, Sarah Abu; Shepherd, Carlton; Akram, Raja Naeem; Sauveron, Damien; University of Aberdeen.Computing Science; University of Aberdeen.Cybersecurity and PrivacyItem DECML: Distributed Edge Consensus Machine Learning Framework(IEEE Computer Science, 2025-01-14) Verdeyen, Cyrile; Shepherd, Carlton; Markantonakis, Konstantinos; Akram, Raja Naeem; Milroy, Roger; Abu Ghazalah, Sarah; Sauveron, Damien; Bastaki, Eesa; El-Nainay, Mustafa; University of Aberdeen.Computing Science; University of Aberdeen.Cybersecurity and PrivacyItem Multi-objective function-based node-disjoint multipath routing for mobile ad hoc networks(2021-07-25) Velusamy, Bhanumathi; Karunanithy, Kalaivanan; Sauveron, Damien; Akram, Raja Naeem; Cho, Jaehyuk; University of Aberdeen.Computing Science; University of Aberdeen.Cybersecurity and PrivacyItem Secure mobile edge server placement using multi-agent reinforcement learning(2021-08-30) Kasi, Mumraiz Khan; Ghazalah, Sarah Abu; Akram, Raja Naeem; Sauveron, Damien; University of Aberdeen.Computing Science; University of Aberdeen.Cybersecurity and PrivacyItem Security Analysis Using Subjective Attack Trees(Springer, 2021-02-04) Al-Hadhrami, Nasser; Collinson, Matthew; Oren, Nir; Maimut, Diana; Oprina, Andrei-George; Sauveron, Damien; University of Aberdeen.Natural & Computing Sciences; University of Aberdeen.Computing Science; University of Aberdeen.Centre for Health Data Science; University of Aberdeen.Agents at Aberdeen; University of Aberdeen.Cybersecurity and PrivacyItem Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions : A Reproducibility Study(2024) Markantonakis, Konstantinos; Meister, Julia A.; Gurulian, Iakovos; Shepherd, Carlton; Akram, Raja Naeem; Ghazalah, Sarah Abu; Kasi, Mumraiz; Sauveron, Damien; Hancke, Gerhard; University of Aberdeen.Computing Science; University of Aberdeen.Cybersecurity and Privacy
