Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monitoring and Evaluation of Semantic Rooms., , , , , , and . Collaborative Financial Infrastructure Protection, Springer, (2012)Assessment of Model-based Methodologies to Architect Cyber-Physical Systems., and . COINS, page 146-151. ACM, (2019)On the suitability of Device-to-Device communications for road traffic safety., and . WF-IoT, page 224-229. IEEE Computer Society, (2014)Bloom filter-based efficient broadcast algorithm for the Internet of things., , , , , and . Int. J. Distributed Sens. Networks, (2017)Priority- and Reservation-based Slicing for Future Vehicular Networks., and . NetSoft, page 36-42. IEEE, (2020)A Comparative Effectiveness Evaluation of Map Construction Protocols in Wireless Sensor Networks.. IEEE Syst. J., 8 (3): 708-716 (2014)Increasing security and protection of SCADA systems through infrastructure resilience., , , and . Int. J. Syst. Syst. Eng., 1 (4): 401-413 (2009)Container-based Task Offloading for Time-Critical Fog Computing., , and . 5G World Forum, page 205-211. IEEE, (2020)SemSub: Semantic Subscriptions for the MQTT Protocol., and . WF-IoT, page 1-6. IEEE, (2020)Contact-based buffering for delay-tolerant ad hoc broadcasting.. Comput. Commun., 30 (16): 3144-3153 (2007)