Author of the publication

Security risks in the short-range communication of ubiquitous application.

, , and . ICITST, page 612-617. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Aspects of Short-Range Wireless Communication--Risk Analysis for the Healthcare Application, , and . International Journal of Intelligent Computing Research (IJICR), (2014)MeSSa 2016 - Workshop on Monitoring and Measurability of Software and Network Security, , and . (2016)Executable Object-Oriented Graphical Models of Real-Time Software., , , and . RTS, page 104-109. IEEE, (1993)Architecture for High Confidence Cloud Security Monitoring., , , , and . IC2E, page 195-200. IEEE Computer Society, (2015)Towards Federated Learning-based Collaborative Adaptive Cybersecurity for Multi-microgrids., , , and . WINSYS, page 83-90. SCITEPRESS, (2021)A risk-driven security analysis and metrics development for WSN-MCN router., , and . ICTC, page 342-347. IEEE, (2013)Security risks in the short-range communication of ubiquitous application., , and . ICITST, page 612-617. IEEE, (2013)Towards Security Evaluation based on Evidence Collection.. ISSA, page 1-10. ISSA, Pretoria, South Africa, (2006)Identification of Basic Measurable Security Components in Software-Intensive Systems.. ISSA, page 69-80. ISSA, Pretoria, South Africa, (2009)A Secure Running Environment for Multiple Platforms.. ICSOFT (2), page 129-134. INSTICC Press, (2009)