Author of the publication

Optimal Placement of Security Resources for the Internet of Things.

, , , and . The Internet of Things for Smart Urban Ecosystems, Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security-Constrained Reinforcement Learning Framework for Software Defined Networks., , , and . ICC, page 1-6. IEEE, (2021)Ground plane detection using visual and inertial data fusion., and . ICECS, page 479-482. IEEE, (1998)Remote lab for Stochastic Computing using reconfigurable logic., and . exp.at, page 173-174. IEEE, (2015)Authorization and Obligation Policies in Dynamic Systems., and . ICLP, volume 5366 of Lecture Notes in Computer Science, page 22-36. Springer, (2008)Visualization for Access Control Policy Analysis Results Using Multi-level Grids., , , and . POLICY, page 25-28. IEEE Computer Society, (2009)WF³: A Semantics for Negation in Normal Disjunctive Logic Programs., , and . ISMIS, volume 542 of Lecture Notes in Computer Science, page 459-468. Springer, (1991)Evaluating role mining algorithms., , , , , and . SACMAT, page 95-104. ACM, (2009)Knowledge and the Action Description Language A., , and . Theory Pract. Log. Program., 1 (2): 129-184 (2001)NSL: Hybrid Interpretable Learning From Noisy Raw Data., , , , and . CoRR, (2020)Theory of Disjunctive Logic Programs., , and . Computational Logic - Essays in Honor of Alan Robinson, page 613-639. The MIT Press, (1991)