Author of the publication

Integrity checker for wireless sensor networks in health care applications.

, , and . PervasiveHealth, page 135-138. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart grid data integrity attacks: characterizations and countermeasuresπ., , , , , and . SmartGridComm, page 232-237. IEEE, (2011)Addressing smart grid cyber security., and . CSIIRW, page 44. ACM, (2013)'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State., and . SERENE, volume 6968 of Lecture Notes in Computer Science, page 156-163. Springer, (2011)Cloud Computing-Based Marketplace for Collaborative Design and Manufacturing., , , , , , , , , and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 409-418. (2015)Phasor measurement unit selection for unobservable electric power data integrity attack detection., , and . Int. J. Crit. Infrastructure Prot., 7 (3): 155-164 (2014)DexterNet: An Open Platform for Heterogeneous Body Sensor Networks and its Applications., , , , , , , , , and 5 other author(s). BSN, page 92-97. IEEE Computer Society, (2009)Optimal contracts for wind power producers in electricity markets., , , , , , and . CDC, page 1919-1926. IEEE, (2010)Multi-criteria based staging of Optimal PMU Placement using Fuzzy Weighted Average., , , and . ISIE, page 1-8. IEEE, (2013)Robust Medical Data Delivery for Wireless Pervasive Healthcare., , , and . DASC, page 802-807. IEEE Computer Society, (2009)Attacking and Defending Covert Channels and Behavioral Models, , and . CoRR, (2011)