Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Importance of Composability of Ad Hoc Mobile Middleware and Trust Management., , , , , and . ISAS, volume 3694 of Lecture Notes in Computer Science, page 149-163. Springer, (2005)Mission-Critical Cloud Computing for Critical Infrastructures., , , , , , , and . Smart Grids, CRC Press, (2014)GRIP - Grids with intelligent periphery: Control architectures for Grid2050π., , , , , , , , , and . SmartGridComm, page 7-12. IEEE, (2011)First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems., , , and . CSIIRW, page 39. ACM, (2013)AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects., , , , , , , , , and . SRDS, page 245-253. IEEE Computer Society, (1998)Evaluating Multicast Message Authentication Protocols for Use in Wide Area Power Grid Data Delivery Services., , and . HICSS, page 2151-2158. IEEE Computer Society, (2012)GUTS: A Framework for Adaptive and Configureable Grid User Trust Service., , and . STM, volume 6710 of Lecture Notes in Computer Science, page 84-99. Springer, (2010)Modular over-the-wire configurable security for long-lived critical infrastructure monitoring systems., , , and . DEBS, ACM, (2009)Decentralized voltage stability monitoring and control in the smart grid using distributed computing architecture., , , and . IAS, page 1-9. IEEE, (2016)Scalable Wide-Area Multicast with Temporal Rate Filtering Distribution Framework., , and . CIT, page 1-8. IEEE Computer Society, (2011)