Author of the publication

A Holistic Approach for IoT Networks' Identity and Trust Management - The ERATOSTHENES Project.

, , , , , , , , , , , , , , and . GIOTS, volume 13533 of Lecture Notes in Computer Science, page 338-347. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ontology-based model for trusted critical site supervision in FUSE-IT., , , , , , , and . ICIN, page 313-315. IEEE, (2017)Securing low power device communication in critical infrastructure management - Abstract.. SAM IoT, volume 2739 of CEUR Workshop Proceedings, page 2. CEUR-WS.org, (2020)Risk Assessment in IoT Case Study: Collaborative Robots System., , , , and . SAM IoT, volume 2739 of CEUR Workshop Proceedings, page 3-10. CEUR-WS.org, (2020)Asset-Driven Approach for Security Risk Assessment in IoT Systems., , , , , , and . CRiSIS, volume 12528 of Lecture Notes in Computer Science, page 149-163. Springer, (2020)Rule-Based Model for Smart Building Supervision and Management., , , , , , , , and . SCC, page 9-16. IEEE, (2018)IoT European Security and Privacy Projects: Integration, Architectures and Interoperability, , , , , , , , , and 53 other author(s). chapter 7, page 237--248. River Publishers, (2018)A Holistic Approach for IoT Networks' Identity and Trust Management - The ERATOSTHENES Project., , , , , , , , , and 5 other author(s). GIOTS, volume 13533 of Lecture Notes in Computer Science, page 338-347. Springer, (2022)