Author of the publication

Intrusion Tolerance in Wireless Environments: An Experimental Evaluation.

, , , , and . PRDC, page 357-364. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptare: Supporting automatic and dependable adaptation in dynamic environments., , , , and . ACM Trans. Auton. Adapt. Syst., 7 (2): 18:1-18:25 (2012)Evaluation of LoRa Technology in Flooding Prevention Scenarios., , and . Sensors, 20 (14): 4034 (2020)Architecture and Implementation of an Embedded Wormhole., , and . SIES, page 341-344. IEEE, (2007)Dependable Outlier Detection in Harsh Environments Monitoring Systems., , and . SAFECOMP Workshops, volume 11094 of Lecture Notes in Computer Science, page 224-233. Springer, (2018)Timeout-based adaptive consensus: improving performance through adaptation., , and . SAC, page 492-497. ACM, (2012)VEDLIoT: Very Efficient Deep Learning in IoT., , , , , , , , , and 26 other author(s). CoRR, (2022)Computing Paradigms in Emerging Vehicular Environments: A Review., , , , , , , and . IEEE CAA J. Autom. Sinica, 8 (3): 491-511 (2021)Using Atomic Broadcast to Implement a posteriori Agreement for Clock Synchronization., , and . SRDS, page 115-124. IEEE Computer Society, (1993)Self-Stabilizing Manoeuvre Negotiation: The Case of Virtual Traffic Lights., , and . SRDS, page 354-356. IEEE, (2019)A kernel-based architecture for safe cooperative vehicular functions., , , , , , and . SIES, page 228-237. IEEE, (2014)