Author of the publication

A Trustworthy Architecture for Wireless Industrial Sensor Networks: Research Roadmap of EU TWISNet Trust and Security Project.

, , , , , , , , , and . SysSec@DIMVA, page 63-66. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

(k, n) threshold distributed key exchange for HIP based internet of things., and . MOBIWAC, page 79-86. ACM, (2012)Predicting Bandwidth Utilization on Network Links Using Machine Learning., , and . CoRR, (2021)Challenges and Current Results of the TWISNet FP7 Project - (Extended Abstract)., , , , , , , , , and 1 other author(s). TrustBus, volume 7449 of Lecture Notes in Computer Science, page 232-233. Springer, (2012)A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks., , and . IWSOS, volume 8221 of Lecture Notes in Computer Science, page 157-162. Springer, (2013)HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things., and . COMNET, page 1-8. IEEE, (2012)Time Synchronization Attack Scenarios and Analysis of Effective Self-Detection Parameters in a Distributed Industrial Wireless Sensor Network., , , and . PST, page 1-5. IEEE, (2019)A Cascade-structured Meta-Specialists Approach for Neural Network-based Intrusion Detection., , , and . CCNC, page 1-6. IEEE, (2019)Pseudonymous communications in secure industrial wireless sensor networks., , and . PST, page 98-102. IEEE Computer Society, (2013)D-HIP: A distributed key exchange scheme for HIP-based Internet of Things., and . WOWMOM, page 1-7. IEEE Computer Society, (2012)A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications., , , and . J. Netw. Comput. Appl., (2014)