From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Proposal for an Internet of Things-based Monitoring System Composed by Low Capability, Open Source and Open Hardware Devices., , , и . SENSORNETS, стр. 87-94. SciTePress, (2014)Security Framework for DPWS Compliant Devices., , , , , и . SECURWARE, стр. 87-92. IEEE Computer Society, (2009)Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things., , и . Sensors, 14 (12): 22737-22753 (2014)Security Threats in Network Coding-Enabled Mobile Small Cells., , , , и . BROADNETS, том 263 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 337-346. Springer, (2018)Integration of wearable devices in a wireless sensor network for an E-health application., , , и . IEEE Wirel. Commun., (2013)AAIA: an efficient aggregation scheme against inverting attack for federated learning., , , , , и . Int. J. Inf. Sec., 22 (4): 919-930 (2023)Game Theory based Joint Task Offloading and Resource Allocation Algorithm for Mobile Edge Computing., , , , и . MSN, стр. 791-796. IEEE, (2020)Security services provision for telematic services at the knowledge and information society., , , , , , , и . EATIS, стр. 41. (2007)Intensity normalization of sidescan sonar imagery., , , , , , , , , и . IPTA, стр. 1-6. IEEE, (2016)Usage of VR Headsets for Rehabilitation Exergames., , , и . IWBBIO (2), том 10209 из Lecture Notes in Computer Science, стр. 434-442. (2017)