Author of the publication

Container-Based Honeypot Deployment for the Analysis of Malicious Activity.

, and . GIIS, page 1-4. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

C(I)SO, And Now What? How to Successfully Build Security by Design, by Oberlaender, M. S.CreateSpace Independent Publishing Platform, 2013, 102p., $36.99. ISBN 1480237418.. Inf. Secur. J. A Glob. Perspect., 22 (4): 203 (2013)Open Mobile Alliance (OMA) Security Layer: Architecture, Implementation and Performance Evaluation of the Integrity Unit., , , and . New Gener. Comput., 23 (1): 77-100 (2004)Access Control in Networks Hierarchy: Implementation of Key Management Protocol., and . Int. J. Netw. Secur., 1 (2): 103-109 (2005)Cryptographic technologies and protocol standards for Internet of Things., , and . Internet Things, (2021)Comparison of the Hardware Implementation of Stream Ciphers., , , , and . Int. Arab J. Inf. Technol., 2 (4): 267-274 (2005)Networking Data Integrity: High Speed Architectures and Hardware Implementations., , and . Int. Arab J. Inf. Technol., (2003)Network on Privacy-Aware Audio-and Video-Based Applications for Active and Assisted Living: GoodBrother Project., , and . DSD, page 748-753. IEEE, (2022)A low power fault secure timer implementation based on the Gray encoding scheme., , , and . ICECS, page 537-540. IEEE, (2002)Side Channel Assessment Platforms and Tools for Ubiquitous Systems., , and . Security of Ubiquitous Computing Systems, Springer International Publishing, (2021)Towards Secure and Efficient Multi-generation Cellular Communications: Multi-mode SNOW-3G/V ASIC and FPGA Implementations., , and . ARC, volume 14251 of Lecture Notes in Computer Science, page 159-172. Springer, (2023)