Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly-Based Intrusion Detection Algorithms for Wireless Networks., , and . WWIC, volume 6074 of Lecture Notes in Computer Science, page 192-203. Springer, (2010)A pattern-based framework for the design of secure and dependable SDN/NFV-enabled networks.. City University London, UK, (2019)British Library, EThOS.Real-Time Collection of Electromagnetic Field Measurements Using a Metropolitan Wireless Mesh Network., and . Panhellenic Conference on Informatics, page 123-127. IEEE Computer Society, (2008)An experimental investigation on energy consumption for secure life-logging in smart environments., , and . CAMAD, page 292-296. IEEE, (2012)Experiences and investigations with Heraklion MESH: an experimental metropolitan multi-radio mesh network., , , and . TRIDENTCOM, page 31. ICST, (2008)A Pattern-Driven Adaptation in IoT Orchestrations to Guarantee SPDI Properties., , , , , , and . MSTEC, volume 12512 of Lecture Notes in Computer Science, page 143-156. Springer, (2020)Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations., , , , , , , , , and . CAMAD, page 1-6. IEEE, (2019)Demonstration of channel assignment in a wireless metropolitan MESH network., , , , , and . WOWMOM, page 1-3. IEEE Computer Society, (2009)Heraklion MESH: an experimental metropolitan multi-radio mesh network., , , , , , , and . WiNTECH, page 93-94. ACM, (2007)