Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary., , , , and . IACR Cryptology ePrint Archive, (2008)Titans' revenge: Detecting Zeus via its own flaws., , , and . Comput. Networks, 57 (2): 422-435 (2013)PiNcH: An effective, efficient, and robust solution to drone detection via network traffic analysis., , , and . Comput. Networks, (2020)Location privacy and resilience in wireless sensor networks querying., and . Comput. Commun., 34 (3): 515-523 (2011)A new role mining framework to elicit business roles and to mitigate enterprise risk., , , and . Decis. Support Syst., 50 (4): 715-731 (2011)To Docker or Not to Docker: A Security Perspective., , and . IEEE Cloud Comput., 3 (5): 54-62 (2016)CONNECT: CONtextual NamE disCovery for blockchain-based services in the IoT., , , and . ICC, page 1-6. IEEE, (2017)Jamming mitigation in cognitive radio networks., and . IEEE Netw., 27 (3): 10-15 (2013)Predicting Influential Users in Online Social Network Groups., , , , and . ACM Trans. Knowl. Discov. Data, 15 (3): 35:1-35:50 (2021)A Time Driven Methodology for Key Dimensioning in Multicast Communications., , and . SEC, volume 250 of IFIP Conference Proceedings, page 121-132. Kluwer, (2003)