Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An event correlation approach for fault diagnosis in SCADA infrastructures., , , , and . EWDC, page 15-20. ACM, (2011)Distributed Framework for Cybersecurity of Critical Infrastructures, , , and . Effective Surveillance for Homeland Security: Balancing Technology and Social Issues, (2013)A DBSCAN based approach for jointly segment and classify brain MR images., , , , and . EMBC, page 2993-2996. IEEE, (2015)Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks., , , , , , and . SAFECOMP, volume 8666 of Lecture Notes in Computer Science, page 214-229. Springer, (2014)Detection of Radio Frequency Interference in Satellite Ground Segments., , , , , , and . CSR, page 648-653. IEEE, (2023)QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud., , , and . SITIS, page 527-532. IEEE Computer Society, (2012)QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach., , , , and . Euro-Par Workshops (1), volume 7155 of Lecture Notes in Computer Science, page 15-24. Springer, (2011)Security Engineering of SOA Applications Via Reliability Patterns., , and . J. Softw. Eng. Appl., 4 (1): 1-8 (2011)An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems., , , , and . NBiS, volume 22 of Lecture Notes on Data Engineering and Communications Technologies, page 952-959. Springer, (2018)Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach., , , , , , , , , and 12 other author(s). IDCS, volume 11874 of Lecture Notes in Computer Science, page 318-327. Springer, (2019)