From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A twofold model for the analysis of access control policies in industrial networked systems., , , и . Comput. Stand. Interfaces, (2015)Automatic Detection of Attacks on Cryptographic Protocols: A Case Study., , , и . DIMVA, том 3548 из Lecture Notes in Computer Science, стр. 69-84. Springer, (2005)Seamless Link-Level Redundancy to Improve Reliability of Industrial Wi-Fi Networks., , и . IEEE Trans. Ind. Informatics, 12 (2): 608-620 (2016)Improving Effectiveness of Seamless Redundancy in Real Industrial Wi-Fi Networks., , и . IEEE Trans. Ind. Informatics, 14 (5): 2095-2107 (2018)CAN With eXtensible In-Frame Reply: Protocol Definition and Prototype Implementation., , , и . IEEE Trans. Ind. Informatics, 13 (5): 2436-2446 (2017)Event Notification in CAN-Based Sensor Networks., , , , , и . IEEE Trans. Ind. Informatics, 15 (10): 5613-5625 (2019)Bandwidth Management for Soft Real-Time Control Applications in Industrial Wireless Networks., , , и . IEEE Trans. Ind. Informatics, 13 (5): 2484-2495 (2017)On the Performance of IEEE 802.11e Wireless Infrastructures for Soft-Real-Time Industrial Applications., , , и . IEEE Trans. Ind. Informatics, 6 (3): 425-437 (2010)An improved CAN fieldbus for industrial applications., и . IEEE Trans. Ind. Electron., 44 (4): 553-564 (1997)A software implementation of IEEE 1588 on RTAI/RTnet platforms., , , , , и . ETFA, стр. 1-8. IEEE, (2010)