Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation of an electronic health records system in a small clinic: the viewpoint of clinic staff., , , , and . Behav. Inf. Technol., 28 (1): 5-20 (2009)NET-IT: A Next Generation Intelligent Network Research Agenda., , , , and . ERCIM News, (2023)Tackling Energy Theft in Smart Grids through Data-driven Analysis., , , , , and . ICNC, page 410-414. IEEE, (2020)Self-Organization and Resilience for Networked Systems: Design Principles and Open Research Issues., , , , , and . Proc. IEEE, 107 (4): 819-834 (2019)randomSeed 001., and . SIGGRAPH Art Gallery, page 27. ACM, (2006)Digital Twin-Enhanced Methodology for Training Edge-Based Models for Cyber Security Applications., , and . INDIN, page 226-232. IEEE, (2022)Updates on OpenEP: The Open-Source Platform for Electrophysiological Data Analysis., , , , , , , , , and 6 other author(s). CinC, page 1-4. IEEE, (2022)Safe and Secure Software-Defined Networks for Smart Electricity Substations., , , , and . ACIIDS (Companion), volume 1178 of Communications in Computer and Information Science, page 179-191. Springer, (2020)Openflow: A security analysis, , and . Proceedings of the Workshop on Secure Network Protocols (NPSec), page 6. IEEE, (2013)From old to new: Assessing cybersecurity risks for an evolving smart grid., , , and . Comput. Secur., (2016)