Author of the publication

Detecting Malicious Components in Large-Scale Internet-of-Things Systems and Architectures.

, , and . WorldCIST (1), volume 569 of Advances in Intelligent Systems and Computing, page 155-165. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Simulation of AmI Environments Integrating Social and Network Simulations., , , , , and . AmILP@ECAI, volume 1778 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)Distributed Query Results and IoT Data in a Publish-Subscribe Network Implementing User Notifications., , , , , and . AINA Workshops, page 778-783. IEEE Computer Society, (2016)Physical Processes Control in Industry 4.0-Based Systems: A Focus on Cyber-Physical Systems., , , and . UCAmI (2), volume 10070 of Lecture Notes in Computer Science, page 257-262. (2016)Smart Product Management in Retail Environment Based on Dynamic Pricing and Location Services., , , , and . UCAmI, volume 8867 of Lecture Notes in Computer Science, page 171-178. Springer, (2014)Building Smart Adaptable Cyber-Physical Systems: Definitions, Classification and Elements., , , , , and . UCAmI, volume 9454 of Lecture Notes in Computer Science, page 144-149. Springer, (2015)Plug-and-Play Transducers in Cyber-Physical Systems for Device-Driven Applications., , and . IMIS, page 316-321. IEEE Computer Society, (2016)Detecting Malicious Components in Large-Scale Internet-of-Things Systems and Architectures., , and . WorldCIST (1), volume 569 of Advances in Intelligent Systems and Computing, page 155-165. Springer, (2017)A Two-Phase Algorithm for Recognizing Human Activities in the Context of Industry 4.0 and Human-Driven Processes., , and . WorldCIST (2), volume 931 of Advances in Intelligent Systems and Computing, page 175-185. Springer, (2019)An Intra-Slice Security Solution for Emerging 5G Networks Based on Pseudo-Random Number Generators., , , and . IEEE Access, (2018)A service-oriented monitoring system based on rule evaluation for Home Automation., , , , , and . ICCE, page 329-330. IEEE, (2017)