Author of the publication

Physical Security Detectors for Critical Infrastructures Against New-Age Threat of Drones and Human Intrusion.

, , , , and . ICME Workshops, page 1-4. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prosumer flexibility management in smart grids., , , , , , and . MIPRO, page 432-437. IEEE, (2018)Physical Security Detectors for Critical Infrastructures Against New-Age Threat of Drones and Human Intrusion., , , , and . ICME Workshops, page 1-4. IEEE, (2020)Applying the SERENITY Methodology to the Domain of Trusted Electronic Archiving., , , and . Security and Dependability for Ambient Intelligence, volume 45 of Advances in Information Security, Springer, (2009)Future active Ip networks security architecture., , and . Comput. Commun., 28 (6): 688-701 (2005)Access control to BitTorrent swarms using closed swarms., , , and . AVSTP2P@MM, page 25-30. ACM, (2010)Security Policy Model for Ubiquitous Social Systems., , and . CONTEXT, volume 10257 of Lecture Notes in Computer Science, page 302-314. Springer, (2017)Implementation and Evaluation of Integrity Protection Facilities for Active Grids., , , and . International Conference on Computational Science, volume 3038 of Lecture Notes in Computer Science, page 179-186. Springer, (2004)Towards security architecture for future active IP networks., , and . Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, page 183-195. Kluwer, (2002)An active networks security architecture., , , and . Informatica (Slovenia), (2002)Residential Flexibility Management: A Case Study in Distribution Networks., , , , , , , , and . IEEE Access, (2019)