Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Critical Communications Over Mobile Operators' Networks: 5G Use Cases Enabled by Licensed Spectrum Sharing, Network Slicing and QoS Control., , , , , , , , , and 3 other author(s). IEEE Access, (2018)Security-driven prioritization for tactical mobile networks., , , , and . J. Inf. Secur. Appl., (2022)Smartphone assisted security pairings for the Internet of Things.. VITAE, page 1-5. IEEE, (2014)OpenHouse: A Secure Platform for Distributed Home Services., , , and . PST, page 15-23. IEEE Computer Society, (2008)A Security Analysis of a P2P Incentive Mechanisms for Mobile Devices., , and . ICIW, page 397-402. IEEE Computer Society, (2008)Security Awareness in Software-Defined Multi-Domain 5G Networks., , , , and . Future Internet, 10 (3): 27 (2018)An Overview of the Security Landscape of Virtual Mobile Networks., , , , , , and . IEEE Access, (2021)A Security Architecture for 5G Networks., , , , , , , , , and 5 other author(s). IEEE Access, (2018)Field trial with tactical bubbles for mission critical communications., , , , , , , and . Trans. Emerg. Telecommun. Technol., (2022)Micro-Segmenting 5G., , , , , and . IoTBDS, page 17-28. SciTePress, (2018)