Author of the publication

A Methodology for Security Classification applied to Smart Grid Infrastructures.

, , , and . Int. J. Crit. Infrastructure Prot., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special issue: Reconfigurable wireless communication systems., and . Wirel. Commun. Mob. Comput., 2 (8): 785-787 (2002)InfoInternet for Education in the Global South: A Study of Applications Enabled by Free Information-only Internet Access in Technologically Disadvantaged Areas (authors' version)., , and . CoRR, (2018)Integrating Mobile Devices into Semantic Services Environments, , and . Proceedings of the 2008 The Fourth International Conference on Wireless and Mobile Communications, page 137--143. Washington, DC, USA, IEEE Computer Society, (2008)5G: Service Continuity in Heterogeneous Environments., and . Wireless Personal Communications, 57 (3): 413-429 (2011)A Methodology for Security Classification applied to Smart Grid Infrastructures., , , and . Int. J. Crit. Infrastructure Prot., (2020)License Transfer Mechanisms through Seamless SIM Authentication - Rights Management based on SIM Keys., , and . WINSYS, page 333-338. INSTICC Press, (2006)Privacy Labelling and the Story of Princess Privacy and the Seven Helpers., , , , , , , , and . CoRR, (2020)Building Trustable Remote Monitoring and Management Systems., , and . UCC Companion, page 213-219. IEEE, (2018)Sociality brings Security in Content Sharing., , , and . J. Comput., 5 (12): 1839-1846 (2010)Bridging the Digital Divide: Challenges in Opening the Digital World to the Elderly, Poor, and Digitally Illiterate., , , and . IEEE Consumer Electron. Mag., 8 (1): 78-81 (2019)