Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spectral Inference Networks: Unifying Spectral Methods With Deep Learning., , , , and . CoRR, (2018)Towards the development of a SIL compliant wireless hydrocarbon leakage detection system., , , , , , , and . ETFA, page 1-8. IEEE, (2013)Performance Evaluation of WirelessHART for Factory Automation., and . ETFA, page 1-9. IEEE, (2009)Using wireless sensor networks to enable increased oil recovery., , , and . ETFA, page 1039-1048. IEEE, (2008)Requirements, drivers and analysis of wireless sensor network solutions for the Oil & Gas industry., , , , , and . ETFA, page 219-226. IEEE, (2007)Wireless communication in process control loop: Requirements analysis, industry practices and experimental evaluation., , , , , , , and . ETFA, page 1-8. IEEE, (2014)Security and Independence of Process Safety and Control Systems in the Petroleum Industry., , , , , , , , and . J. Cybersecur. Priv., 2 (1): 20-41 (February 2022)Guest Editorial Special Section on Industrial Communication Technologies and Systems., , and . IEEE Trans. Ind. Informatics, 14 (5): 2062-2065 (2018)Layered Software Challenge of Wireless Technology in the Oil & Gas Industry., , and . Australian Software Engineering Conference, page 37-46. IEEE Computer Society, (2008)ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys., , , , , , and . 3PGCIC, page 465-470. IEEE Computer Society, (2010)