Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing Power Substation Network Security and Survivability: A Work in Progress Report., , and . Security and Management, page 281-287. CSREA Press, (2003)A survivable critical infrastructure control application., , and . CSIIRW, page 34. ACM, (2013)The Impact of Redundancy on DSRC Safety Application Reliability under Different Data Rates., and . NTMS, page 1-5. IEEE, (2014)Insect Population Inspired Wireless Sensor Networks: A Unified Architecture with Survival Analysis, Evolutionary Game Theory, and Hybrid Fault Models., and . BMEI (2), page 636-643. IEEE Computer Society, (2008)978-0-7695-3118-2.An outline of the three-layer survivability analysis architecture for strategic information warfare research., , and . CSIIRW, page 28. ACM, (2009)Security and Survivability of Networked Systems: Minitrack Introduction., and . HICSS, IEEE Computer Society, (2004)A prototype for a real-time weather responsive system., , and . ITSC, page 1465-1470. IEEE, (2012)A measurement-based design and evaluation methodology for embedded control systems., , , , and . CSIIRW, page 34. ACM, (2011)Neighborhood monitoring in ad hoc networks., and . CSIIRW, page 40. ACM, (2010)The handicap principle, strategic information warfare and the paradox of asymmetry., , and . CSIIRW, page 35. ACM, (2010)