Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT European Security and Privacy Projects: Integration, Architectures and Interoperability, , , , , , , , , and 53 other author(s). chapter 7, page 237--248. River Publishers, (2018)Using Attribute-Based Encryption on IoT Devices with instant Key Revocation., , and . PerCom Workshops, page 126-131. IEEE, (2019)IoTCrawler: Browsing the Internet of Things., , , , , , , , , and 4 other author(s). GIoTS, page 1-6. IEEE, (2018)Knowledge-Based Spatial Reasoning for IoT-Enabled Smart City Applications., , and . DSDIS, page 736-737. IEEE Computer Society, (2015)Event Detection for Urban Dynamic Data Streams., , , and . ICDM Workshops, page 53-60. IEEE Computer Society, (2016)IoTCrawler: Challenges and Solutions for Searching the Internet of Things., , , , , , , , , and 13 other author(s). Sensors, 21 (5): 1559 (2021)IoTCrawler: Challenges and Solutions for Searching the Internet of Things, , , , , , , , , and 13 other author(s). Sensors, (2021)Modelling of Resource-Aware Information Flows for Resource Constraint IoT Devices., and . GIOTS, volume 13533 of Lecture Notes in Computer Science, page 302-314. Springer, (2022)Virtual Sensor Creation to Replace Faulty Sensors Using Automated Machine Learning Techniques., , , and . GIoTS, page 1-6. IEEE, (2020)Resource-aware Security Configuration for Constrained IoT Devices., and . Q2SWinet, page 7-14. ACM, (2023)