Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Demo Paper: Helping IoT Application Developers with Sensor-based Linked Open Rules., , and . TC/SSN@ISWC, volume 1401 of CEUR Workshop Proceedings, page 105-108. CEUR-WS.org, (2014)An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture., , and . iThings/GreenCom/CPSCom, page 109-116. IEEE Computer Society, (2014)Policy-driven model for security management., and . Net-Con, volume 235 of IFIP Conference Proceedings, page 419-424. Kluwer, (2002)The STAC (security toolbox: attacks & countermeasures) ontology., , and . WWW (Companion Volume), page 165-166. International World Wide Web Conferences Steering Committee / ACM, (2013)Applying Internet of Things for personalized healthcare in smart homes, , , , and . 2015 24th Wireless and Optical Communication Conference (WOCC), page 164--169. IEEE, (2015)Network security management with intelligent agents., , , and . NOMS, page 579-592. IEEE, (2000)A Flexible Approach to Semi-Automatic Accessibility Evaluation., , , and . ICWI, page 1083-1088. IADIS, (2003)Standardizing generic cross-domain applications in Internet of Things., , , and . GLOBECOM Workshops, page 589-594. IEEE, (2014)What Do You Think About Your Company's Leaks? A Survey on End-Users Perception Toward Data Leakage Mechanisms., , and . Frontiers Big Data, (2020)Usability of End-to-End Encryption in E-Mail Communication., , , and . Frontiers Big Data, (2021)