Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing WirelessHART: Monitoring, Exploring and Detecting New Vulnerabilities., , , , and . NCA, page 1-9. IEEE, (2018)Place-&-Play industrial router addressing potential explosive atmospheres., , , and . IECON, page 3914-3918. IEEE, (2014)Edge-Based IPFS for Content Distribution of City Services., , and . ISCC, page 963-969. IEEE, (2023)Achieving Human-Aware Seamless Handoff., , , , and . DCOSS, page 254-259. IEEE Computer Society, (2015)Assessing Redundancy Models for IoT Reliability., , , , , , , and . WOWMOM, page 14-15. IEEE Computer Society, (2018)A Survey of IoT Management Protocols and Frameworks., , , , , , and . IEEE Commun. Surv. Tutorials, 22 (2): 1168-1190 (2020)Over-The-Air updates for Software Defined Vehicle services with IPFS., , , , and . NOMS, page 1-9. IEEE, (2024)An Integrated Approach to Human-in-the-Loop Systems and Online Social Sensing., , , , , , , and . INFOCOM Workshops, page 478-483. IEEE, (2019)Towards Effective IoT Management., , , , , and . IEEE SENSORS, page 1-4. IEEE, (2018)Backhaul Assessment in Dual Band WiFi Mesh., , , , and . ISCC, page 880-883. IEEE, (2023)