Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Autonomous Smart Routing for Network QoS., , , , and . ICAC, page 232-239. IEEE Computer Society, (2004)Demonstrating Voice over an Autonomic Network., and . ICAC, page 139-140. IEEE Computer Society, (2015)Research and Innovation Action for the Security of the Internet of Things: The SerIoT Project., , , , and . Euro-CYBERSEC, volume 821 of Communications in Computer and Information Science, page 101-118. Springer, (2018)Static Analysis-Based Approaches for Secure Software Development., , , and . Euro-CYBERSEC, volume 821 of Communications in Computer and Information Science, page 142-157. Springer, (2018)A simulation study of schemes for block loss reduction in ATM networks using FEC and buffer management., , and . ICCCN, page 124. IEEE Computer Society, (1995)Signaling Attacks in Mobile Telephony., and . SECRYPT, page 206-212. SciTePress, (2014)A Diffusion Model for Energy Harvesting Sensor Nodes., and . MASCOTS, page 154-158. IEEE Computer Society, (2016)A Probability Model of Uncertainty in Data Bases., and . ICDE, page 328-333. IEEE Computer Society, (1986)High-level information fusion and mission planning in highly anisotropic threat spaces., , , , , and . FUSION, page 1-8. IEEE, (2008)Security for Internet of Things: The SerIoT Project., , , , and . ISNCC, page 1-5. IEEE, (2018)