Author of the publication

Security measurement on a cloud-based cyber-physical system used for Intelligent Transportation.

, , , , and . ICVES, page 97-102. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combinatorial Optimization of Group Key Management., , , and . J. Netw. Syst. Manag., 12 (1): 33-50 (2004)Stack and Queue Layouts for Toruses and Extended Hypercubes., , , and . HICSS, page 1-10. IEEE Computer Society, (2010)On Sorting by Prefix Reversals and the Diameter of Pancake Networks., and . Heinz Nixdorf Symposium, volume 678 of Lecture Notes in Computer Science, page 218-227. Springer, (1992)Improved Techniques for MCM Layer Assignment., , and . ICCD, page 604-607. IEEE Computer Society, (1994)Algorithms and bounds for layer assignment of MCM routing., , and . IEEE Trans. Very Large Scale Integr. Syst., 2 (2): 265-270 (1994)Content Based File Type Detection Algorithms., and . HICSS, page 332. IEEE Computer Society, (2003)On the Diameter of the Pancake Network., and . J. Algorithms, 25 (1): 67-94 (1997)IoT security attacks using reverse engineering methods on WSN applications., , and . WF-IoT, page 182-187. IEEE Computer Society, (2016)Towards Trusted Online Dissemination of Consumer Information., , , and . HICSS, IEEE Computer Society, (2004)Combinatorial Optimization of Multicast Key Management., , , and . HICSS, page 332. IEEE Computer Society, (2003)