Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DoS attack detection using a two dimensional wavelet transform., , , , , and . CLEI, page 1-8. IEEE, (2012)Model Driven Implementation of Security Management Process., , and . MODELSWARD, page 229-238. SciTePress, (2017)Towards a reference ontology for security in the Internet of Things., , and . M&N, page 1-6. IEEE, (2015)An Ontology-Based Cybersecurity Framework for the Internet of Things., , , , and . Sensors, 18 (9): 3053 (2018)An Application of Ontological Engineering for Design and Specification of Ontocancro., , , , , and . PACBB, volume 1240 of Advances in Intelligent Systems and Computing, page 134-143. Springer, (2020)An Ontology-based Security Framework for Decision-making in Industrial Systems., , , and . MODELSWARD, page 779-788. SciTePress, (2016)A Model-Driven Adaptive Approach for IoT Security., , , and . MODELSWARD (Revised Selected Papers), volume 692 of Communications in Computer and Information Science, page 194-215. Springer, (2016)The application of security adaptive framework for sensor in industrial systems., , , and . SAS, page 1-6. IEEE, (2016)Network-Wide Initiatives to Control Measurement Mechanisms: A Survey., , and . IEEE Commun. Surv. Tutorials, 20 (2): 1475-1491 (2018)An approach to automatic customization of user interfaces for mobile devices in pervasive environments., , , , , , and . CLEI, page 1-7. IEEE, (2012)