Author of the publication

Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems.

, , , , , and . TrustBus, volume 5695 of Lecture Notes in Computer Science, page 86-94. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An anti-spam scheme using pre-challenges., , and . Comput. Commun., 29 (15): 2739-2749 (2006)A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks., , and . CANS, volume 5339 of Lecture Notes in Computer Science, page 120-132. Springer, (2008)Integrating wireless sensor networks and the internet: a security analysis., and . Internet Res., 19 (2): 246-259 (2009)The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection., , and . Inf. Secur. Tech. Rep., 12 (1): 24-31 (2007)Feasibility of Societal Model for Securing Internet of Things., , , and . KSII Trans. Internet Inf. Syst., 12 (8): 3567-3588 (2018)Key management systems for sensor networks in the context of the Internet of Things., , , and . Comput. Electr. Eng., 37 (2): 147-159 (2011)Current cyber-defense trends in industrial control systems., , , and . Comput. Secur., (2019)Selecting key management schemes for WSN applications., , , and . Comput. Secur., 31 (8): 956-966 (2012)Security of industrial sensor network-based remote substations in the context of the Internet of Things., , , and . Ad Hoc Networks, 11 (3): 1091-1104 (2013)Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks., , and . FOSAD, volume 5705 of Lecture Notes in Computer Science, page 289-338. Springer, (2009)