Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Natural Laws as a Baseline for Network Anomaly Detection., , and . Trustcom/BigDataSE/ISPA, page 370-377. IEEE, (2016)RECOUP: efficient reconfiguration for wireless sensor networks., , and . MobiQuitous, ICST / ACM, (2008)Editorial: Special issue on Identity Protection and Management., , and . J. Inf. Secur. Appl., 19 (1): 1 (2014)Policy based network management in high assurance environments., and . GLOBECOM, page 2151-2157. IEEE, (2004)Image Classification using non-linear Support Vector Machines on Encrypted Data., , , , , , and . IACR Cryptol. ePrint Arch., (2017)Policy Based Management for Security in Cloud Computing., , , , , , and . STA Workshops, volume 187 of Communications in Computer and Information Science, page 130-137. Springer, (2011)Towards adaptive security for convergent wireless sensor networks in beyond 3G environments., , , , , , , , and . Wirel. Commun. Mob. Comput., 10 (9): 1193-1207 (2010)Integration and Management of Multiple Radios in Satellite-Terrestrial based Aeronautical Communication Networks., , , , , , , , , and . EAI Endorsed Trans. Ubiquitous Environ., 1 (1): e4 (2012)Managing runtime re-engineering of a System-of-Systems for cyber security., and . SoSE, page 13-18. IEEE, (2011)Security Risk Assessment and Risk Treatment for Integrated Modular Communication., , and . ARES, page 503-509. IEEE Computer Society, (2016)