Author of the publication

An effective approach for injecting faults in wireless sensor network operating systems.

, , , and . ISCC, page 567-569. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain-empowered decentralised trust management for the Internet of Vehicles security., , , and . Comput. Electr. Eng., (2020)Achieving all the time, everywhere access in next-generation mobile networks., , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 9 (2): 29-39 (2005)LSTM-based failure prediction for railway rolling stock equipment., , , , , , , , and . Expert Syst. Appl., (July 2023)Micro2vec: Anomaly detection in microservices systems by mining numeric representations of computer logs., , and . J. Netw. Comput. Appl., (2022)Fast Abstracts and Student Forum Proceedings, 17th European Dependable Computing Conference - EDCC 2021., and . CoRR, (2021)Partitioned Containers: Towards Safe Clouds for Industrial Applications., , , , , and . DSN-S, page 84-88. IEEE, (2023)Collecting and Analyzing Failure Data of Bluetooth Personal Area Networks., , and . DSN, page 313-322. IEEE Computer Society, (2006)Cost-Benefit Analysis of Virtualizing Batch Systems: Performance-Energy-Dependability Trade-Offs., , , and . UCC, page 264-268. IEEE Computer Society, (2013)Automated Logging of Mobile Phones Failures Data., , and . ISORC, page 520-530. IEEE Computer Society, (2006)Analysis of bugs in Apache Virtual Computing Lab., , , , and . DSN, page 1-6. IEEE Computer Society, (2013)