Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Suitability of WiFi based communication devices in low power industrial applications., , and . ICIT, page 1307-1312. IEEE, (2017)Employee Trust Based Industrial Device Deployment and Initial Key Establishment., , , and . CoRR, (2016)Applicability of LTE Public Key Infrastructure Based Device Authentication in Industrial Plants., , , , and . COMPSAC, page 510-515. IEEE Computer Society, (2015)Towards trustworthiness assessment of industrial heterogeneous networks., , , and . ETFA, page 1-6. IEEE, (2015)WirelessHART device integration challenges and solutions in industrial automation., , and . ETFA, page 1-4. IEEE, (2013)Towards security assurance for heterogeneous industrial networks., , , and . IECON, page 4488-4493. IEEE, (2015)Reusability assessment of financial card readers' security mechanisms in process control devices., , , , and . INDIN, page 494-499. IEEE, (2013)Wireless infrastructure for oil and gas inventory management., , and . IECON, page 5461-5466. IEEE, (2013)Balancing network performance and network security in a smart grid application., , , and . INDIN, page 618-624. IEEE, (2016)Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase., , , and . EAI Endorsed Trans. Security Safety, 3 (7): e5 (2016)