From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An IDS framework for internet of things empowered by 6LoWPAN., , , , и . CCS, стр. 1337-1340. ACM, (2013)Denial-of-Service detection in 6LoWPAN based Internet of Things., , , и . WiMob, стр. 600-607. IEEE Computer Society, (2013)Security Flaws in 802.11 Wireless Network., и . ICWN, стр. 23-27. CSREA Press, (2009)Securing Emergent IoT Applications., и . SETSS, том 11430 из Lecture Notes in Computer Science, стр. 99-147. Springer, (2018)Workflow-aware access control for the Internet of Things.. University of Passau, Germany, (2021)Secure Remote Maintenance via Workflow-Driven Security Framework., , , , и . Blockchain, стр. 29-37. IEEE, (2021)Securing the Integrity of Workflows in IoT., и . EWSN, стр. 252-257. Junction Publishing, Canada/ ACM, (2018)Demo: Dependable and scalable multi-radio networked embedded system., , и . SoftCOM, стр. 421-422. IEEE, (2014)Enforcing a Cross-Organizational Workflow: An Experience Report., , , и . BPMDS/EMMSAD@CAiSE, том 387 из Lecture Notes in Business Information Processing, стр. 85-98. Springer, (2020)Towards achieving confidentiality in Hyperledger Fabric., , и . Blockchain, стр. 384-391. IEEE, (2022)