Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Security Risk Assessment of Smartphones using Bayesian Networks., , and . J. Cyber Secur. Mobil., 4 (2-3): 65-86 (2015)Novel Industry Architectures for Connectivity Solutions in the Smart Distribution Grids., , , , and . IEEE Access, (2023)Energy efficiency of mobile handsets: Measuring user attitudes and behavior., , , and . Telematics Informatics, 29 (4): 387-399 (2012)A Framework for Measuring the Deployment of Internet Protocols., , , and . Int. J. IT Stand. Stand. Res., 12 (1): 38-62 (2014)The mitigating role of regulation on the concentric patterns of broadband diffusion. The case of Finland., , , and . Telematics Informatics, (2019)Design and Governance of mHealth Data Sharing., , and . Commun. Assoc. Inf. Syst., (2019)Scenario planning for emerging mobile services decision making: mobile Peer-to-Peer Session Initiation Protocol case study., , and . IJIDS, 1 (1): 26-43 (2008)Scenario Analysis and System Dynamics in New Emerging Technology Research: Case Mobile Peer-to-Peer Content Distribution., , and . AP2PS, page 60-65. IEEE Computer Society, (2009)Cost model for a 5G smart light pole network., , , and . CTTE-FITCE, page 1-6. IEEE, (2019)Modeling the Value of End-to-End Multipath Protocols., , and . J. Univers. Comput. Sci., 18 (14): 2071-2092 (2012)