Author of the publication

A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks.

, , and . IWSOS, volume 8221 of Lecture Notes in Computer Science, page 157-162. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

(k, n) threshold distributed key exchange for HIP based internet of things., and . MOBIWAC, page 79-86. ACM, (2012)Challenges and Current Results of the TWISNet FP7 Project - (Extended Abstract)., , , , , , , , , and 1 other author(s). TrustBus, volume 7449 of Lecture Notes in Computer Science, page 232-233. Springer, (2012)Anomaly Detection in Vehicle-to-Infrastructure Communications., , , and . VTC Spring, page 1-6. IEEE, (2018)Autonomous Detection of Synchronization Attacks in the Industrial Internet Of Things., , , and . IPCCC, page 1-9. IEEE, (2019)Efficient Network Representation for GNN-Based Intrusion Detection., , and . ACNS (1), volume 13905 of Lecture Notes in Computer Science, page 532-554. Springer, (2023)A Distributed Approach for Secure M2M Communications., , and . NTMS, page 1-7. IEEE, (2012)HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things., and . COMNET, page 1-8. IEEE, (2012)Time Synchronization Attack Scenarios and Analysis of Effective Self-Detection Parameters in a Distributed Industrial Wireless Sensor Network., , , and . PST, page 1-5. IEEE, (2019)A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks., , and . IWSOS, volume 8221 of Lecture Notes in Computer Science, page 157-162. Springer, (2013)Pseudonymous communications in secure industrial wireless sensor networks., , and . PST, page 98-102. IEEE Computer Society, (2013)