Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Modeling for Security Analytics., , , , and . CISRC, page 22:1-22:4. ACM, (2016)Automatic Identification of Critical Digital Assets., , , and . ICDIS, page 219-224. IEEE, (2019)HydroSense: A self-powered wireless device for monitoring water usage in hotel showers., , , , , , , , and . GHTC, page 314-320. IEEE, (2015)Interoperability Verification in ISO 18000-7 Active RFID Systems: Experimental Setup and Results., , and . Wireless Personal Communications, 68 (3): 619-635 (2013)Implementing an Attack Graph Generator in CUDA., , and . IPDPS Workshops, page 730-738. IEEE, (2020)Combining OpenCL and MPI to Support Heterogeneous Computing on a Cluster., , and . PEARC, page 5:1-5:6. ACM, (2019)Modeling and simulation of electric power substation employing an IEC 61850 network., , and . CISR, page 89-92. ACM, (2014)Data Privacy Issues with RFID in Healthcare., and . Medical Data Privacy Handbook, Springer, (2015)Using Radio Frequency Identification (RFID) Tags to Store Medical Information Needed by First Responders: Data Format, Privacy, and Security., and . Int. J. Comput. Model. Algorithms Medicine, 3 (3): 10-26 (2012)Radio frequency identification prototyping., , , , , , , and . ACM Trans. Design Autom. Electr. Syst., 13 (2): 29:1-29:22 (2008)