Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Whole exome sequencing analysis pipeline for the discovery of mutations causative of human rare diseases., , , , , , , , , and 1 other author(s). IWBBIO, page 253-254. Copicentro Editorial, (2013)Characterizing Normal and Pathological Gait through Permutation Entropy., , , , , , and . Entropy, 20 (1): 77 (2018)Modeling and Simulation of Upper Brachial Plexus Injury., , , , , and . IEEE Syst. J., 10 (3): 912-921 (2016)Evolving privacy: From sensors to the Internet of Things., , , and . Future Gener. Comput. Syst., (2017)Editorial., and . Comput. Secur., 29 (5): 521-522 (2010)Editorial., and . Comput. Secur., 28 (6): 325-326 (2009)Diagnosis mechanism for accurate monitoring in critical infrastructure protection., and . Comput. Stand. Interfaces, 36 (3): 501-512 (2014)A Segregated Architecture for a Trust-based Network of Internet of Things., , , and . CCNC, page 1-6. IEEE, (2019)Concurrent access control for multi-user and multi-processor systems based on trust relationships., , and . Concurr. Comput. Pract. Exp., 21 (10): 1389-1403 (2009)A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services., , , , and . IEEE Commun. Surv. Tutorials, 20 (4): 3453-3495 (2018)