Skip to main content
Science of Security Virtual Organization

Header Menu

  • Research
    • Virtual Institutes
    • Lablets
    • Projects
    • Publications
  • Competitions
    • Cybersecurity Paper Competition
    • ISEF
  • Meetings
    • HotSoS Symposium
    • HCSS Conference
    • C3E Workshop
    • SCC Meeting
Not a member? Forgot your password?

Hamburger Menu

  • Home
  • Projects
  • News
  • Events

Breadcrumb

  • Home /
  • Merouane Debbah
First name
Merouane
Last name
Debbah
Ferrag, M. A., Kantarci, B., Cordeiro, L. C., Debbah, M., & Choo, K.-K. R. (2023). Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-Enabled IoTs: An Anticipatory Study. In (p. 1253—1258). http://doi.org/10.1109/ICCWorkshops57953.2023.10283797 (Original work published 2025)
View
Ghirmai, S., Mebrahtom, D., Aloqaily, M., Guizani, M., & Debbah, M. (2022). Self-Sovereign Identity for Trust and Interoperability in the Metaverse. In (pp. 2468–2475). Haikou, China: IEEE. http://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00345 (Original work published 2025)
View
© 2025 Science of Security Virtual Organization

Footer

  • Terms
  • Follow Us on X