Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authorization through trust chains in ad hoc grids., and . EATIS, page 13. (2009)Multi-Hub Location Heuristic for Alert Routing., , , and . IEEE Access, (2019)A parallel processing of spatial data interpolation on computing cloud., , , and . BCI, page 193-198. ACM, (2012)A Comparative Analysis of High Availability for Linux Container Infrastructures., , and . Future Internet, 15 (8): 253 (2023)Proposal for an IIoT Device Solution According to Industry 4.0 Concept., , , , , and . Sensors, 22 (1): 325 (2022)Resistance of IoT Sensors against DDoS Attack in Smart Home Environment., , and . Sensors, 20 (18): 5298 (2020)A Study of DDoS Reflection Attack on Internet of Things in IPv4/IPv6 Networks., and . CSOC (1), volume 984 of Advances in Intelligent Systems and Computing, page 109-118. Springer, (2019)IoT Measuring of UDP-Based Distributed Reflective DoS Attack., , and . SISY, page 209-214. IEEE, (2018)Vulnerability of Smart IoT-Based Automation and Control Devices to Cyber Attacks., , , and . CSOC (3), volume 1226 of Advances in Intelligent Systems and Computing, page 287-294. Springer, (2020)DDoS Reflection Attack Based on IoT: A Case Study., , and . CSOC (3), volume 765 of Advances in Intelligent Systems and Computing, page 44-52. Springer, (2018)