Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Tool for Calculating Energy Consumption in Wireless Sensor Networks., , , and . Panhellenic Conference on Informatics, volume 3746 of Lecture Notes in Computer Science, page 611-621. Springer, (2005)Wireless Sensor Networks: Business Models and Market Issues., , , and . CTTE, page 1-5. IEEE, (2007)Üser Authentication Method and Implementation Using a Three-Axis Accelerometer"., , , and . MOBILIGHT, volume 45 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 192-202. Springer, (2010)The higher the better? Think twice!, , , , and . ISCCSP, page 274-277. IEEE, (2014)Supporting Service Differentiation in Wireless Sensor Networks., , , and . Panhellenic Conference on Informatics, page 127-133. IEEE Computer Society, (2011)A honeypot-driven cyber incident monitor: lessons learned and steps ahead, , , and . International Conference on Security of Information and Networks, (2015)i-Protect: An Open Source Emergency Management Framework., , , , , , and . Panhellenic Conference on Informatics, page 386-391. IEEE Computer Society, (2011)Live forensics framework for wireless sensor nodes using sandboxing., , , , and . Q2SWinet, page 70-77. ACM, (2010)Semantically enriched navigation for indoor environments., , , and . IJWGS, 2 (4): 453-478 (2006)A view on privacy & trust in IoT., , and . ICC Workshops, page 2665-2670. IEEE, (2015)