Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Delay-tolerant data sharing in tactical environments., , , and . MILCOM, page 605-610. IEEE, (2017)Comparative Analysis of Ad-Hoc Networks Oriented to Collaborative Activities., , and . ARCS, volume 3894 of Lecture Notes in Computer Science, page 465-479. Springer, (2006)Establishing Trusted Identities in Disconnected Edge Environments., , , and . SEC, page 51-63. IEEE Computer Society, (2016)Augur: a step towards realistic drift detection in production ML systems., , , and . SE4RAI@ICSE, page 37-44. ACM, (2022)KalKi++: A Scalable and Extensible IoT Security Platform., , , , , , , , and . WF-IoT, page 368-373. IEEE, (2021)Towards an Architecture for Trusted Edge IoT Security Gateways., , , , , , and . HotEdge, USENIX Association, (2020)Cloudlet-based cyber-foraging for mobile systems in resource-constrained edge environments., , , , and . ICSE Companion, page 412-415. ACM, (2014)Tactical Cloudlets: Moving Cloud Computing to the Edge., , , , and . MILCOM, page 1440-1446. IEEE, (2014)KalKi: A Software-Defined IoT Security Platform., , , , , , , , and . WF-IoT, page 1-6. IEEE, (2020)Authentication and Authorization for IoT Devices in Disadvantaged Environments., , , and . WF-IoT, page 368-373. IEEE, (2019)