Author of the publication

Eurobalise-Train communication modelling to assess interferences in railway control signalling systems.

, , , , , , , , and . Netw. Protoc. Algorithms, 8 (1): 58-72 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SCADA Systems in the Railway Domain: Enhancing Reliability through Redundant MultipathTCP., , , and . ITSC, page 2305-2310. IEEE, (2015)A high performance link layer mobility management strategy for professional private broadband networks., , , and . J. Netw. Comput. Appl., 36 (4): 1152-1163 (2013)A lossy channel aware parameterisation of a novel security protocol for wireless IP-enabled sensors., , , , and . Wirel. Networks, 21 (4): 1289-1308 (2015)A Contribution to Safe Railway Operation: Evaluating the Effect of Electromagnetic Disturbances on Balise-to-BTM Communication in Railway Control Signaling Systems., , , , , and . IEEE Veh. Technol. Mag., 16 (2): 104-112 (2021)WiMax on Rails., , , , and . IEEE Veh. Technol. Mag., 3 (3): 47-56 (2008)A Framework for Vulnerability Detection in European Train Control Railway Communications., , , and . Secur. Commun. Networks, (2018)Leveraging Semantic Technologies for Digital Interoperability in the European Railway Domain., , , , , , and . ISWC, volume 12922 of Lecture Notes in Computer Science, page 648-664. Springer, (2021)Next-Generation SDN and Fog Computing: A New Paradigm for SDN-Based Edge Computing., , , and . Fog-IoT, volume 80 of OASIcs, page 9:1-9:8. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Cyber security analysis of the European train control system., and . IEEE Communications Magazine, 53 (10): 110-116 (2015)Design and formal security evaluation of NeMHIP: A new secure and efficient network mobility management protocol based on the Host Identity Protocol., , , , and . Comput. Secur., (2013)