Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Autonomous Industrial Warehouse Inspection., , , and . ICAC, page 1-6. IEEE, (2021)Software Security Considerations for IoT., , , , , , and . iThings/GreenCom/CPSCom/SmartData, page 392-397. IEEE, (2016)Where Does Your Data Go? Comparing Network Traffic and Privacy Policies of Public Sector Mobile Applications., , , , and . WorldCIST (1), volume 468 of Lecture Notes in Networks and Systems, page 214-225. Springer, (2022)Internal Interface Diversification as a Security Measure in Sensor Networks., , , , , , and . J. Sens. Actuator Networks, 7 (1): 12 (2018)Interface diversification in IoT operating systems., , , , and . UCC, page 304-309. ACM, (2016)Evaluation of the Pedagogical Quality of Mobile Math Games in App Marketplaces., , , , , , , and . ICE/ITMC, page 1-8. IEEE, (2020)Increasing Customer Awareness on Food Waste at University Cafeteria with a Sensor-Based Intelligent Self-Serve Lunch Line., , , , , , , and . ICE/ITMC, page 1-9. IEEE, (2020)Technical cheating prevention in location-based games., , , and . CompSysTech, page 40-48. ACM, (2021)Applying Internal Interface Diversification to IoT Operating Systems., , and . ICSSA, page 1-5. IEEE, (2016)Towards Profiling Program Instances in Host-Based Intrusion Detection Systems by Recognizing Software Update Patterns., , and . SIN, page 21:1-21:4. ACM, (2018)