From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An emulator for the network stack of Integrated Modular Systems., , , и . SoSE, стр. 1-6. IEEE, (2010)A pilot study on the security of pattern screen-lock methods and soft side channel attacks., , , и . WISEC, стр. 1-6. ACM, (2013)Managing cyber security risks in industrial control systems with game theory and viable system modelling., , , , и . SoSE, стр. 266-271. IEEE, (2014)Digital investigations for IPv6-based Wireless Sensor Networks., , , , и . Digit. Investig., 11 (Supplement 2): S66-S75 (2014)Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks., , и . WISTP, том 7886 из Lecture Notes in Computer Science, стр. 34-49. Springer, (2013)Microsecond-Accuracy Time Synchronization Using the IEEE 802.15.4 TSCH Protocol., , , , , и . LCN Workshops, стр. 156-164. IEEE Computer Society, (2016)ADDER: Probabilistic, Application Layer Service Discovery for MANETs and Hybrid Wired-Wireless Networks., , , и . CNSR, стр. 33-40. IEEE Computer Society, (2011)Experiences from porting the Contiki operating system to a popular hardware platform., и . DCOSS, стр. 1-6. IEEE Computer Society, (2011)Forensic analysis of wireless networking evidence of Android smartphones., , и . WIFS, стр. 109-114. IEEE, (2012)Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method., , и . HCI (24), том 8533 из Lecture Notes in Computer Science, стр. 115-126. Springer, (2014)