Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Usable Access Control Enabled by Sensing Enterprise Architectures., , , , , , , and . IWEI Workshops, volume 1414 of CEUR Workshop Proceedings, CEUR-WS.org, (2015)Integrated system for control and monitoring industrial wireless networks for labor risk prevention., , , , , , , , , and 6 other author(s). J. Netw. Comput. Appl., (2014)Enhanced multi-domain access control for secure mobile collaboration through Linked Data cloud in manufacturing., , , and . WOWMOM, page 1-9. IEEE Computer Society, (2013)Sensing Enabled Capabilities for Access Control Management: IoT as an Enabler for the Advanced Management of Access Control., , , , , , , , , and 1 other author(s). IoTDI, page 253-258. IEEE Computer Society, (2016)Recommender Systems in Cybersecurity., , and . Knowl. Inf. Syst., 65 (12): 5523-5559 (December 2023)Software Defined Monitoring (SDM) for 5G mobile backhaul networks., , , , , , and . LANMAN, page 1-6. IEEE, (2017)Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors., , , , and . Sensors, 18 (2): 575 (2018)Enhancing Security of Software Defined Mobile Networks., , , , , , , , , and . IEEE Access, (2017)SDN and NFV integration in generalized mobile network architecture., , , , , , , , , and 2 other author(s). EuCNC, page 154-158. IEEE, (2015)