Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A mesh-based command and control sensing system for public safety scenarios., , , , and . SenSys, page 395-396. ACM, (2011)A Security Reference Model for Autonomous Vehicles in Military Operations., , , , , , , , , and . CNS, page 1-8. IEEE, (2020)Securing Autonomous and Unmanned Vehicles for Mission Assurance*., , , , , , , , and . ICMCIS, page 1-8. IEEE, (2019)Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures., , , , , , , , , and 4 other author(s). CoRR, (2020)Extending ODMRP for on-site deployments in disaster area scenarios., , , , , and . IPCCC, page 1-10. IEEE Computer Society, (2013)Adaptive HELLO for the Neighborhood Discovery Protocol., and . LCN, page 470-478. IEEE Computer Society, (2012)Measuring and modeling performance of WLAN communication for multistatic sonar applications., , and . LCN, page 382-385. IEEE Computer Society, (2015)Reducing MANET neighborhood discovery overhead., , and . LCN, page 374-377. IEEE Computer Society, (2014)Deploying a mesh-based command and control sensing system in a disaster area maneuver., , , , and . SenSys, page 335-336. ACM, (2011)Distributed and Collaborative Malware Analysis with MASS., , and . LCN, page 191-194. IEEE Computer Society, (2017)