Author of the publication

A distributed monitoring architecture for AMIs: minimizing the number of monitoring nodes and enabling collided packet recovery.

, , , and . SEGS@CCS, page 35-40. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visualizing Privacy Risks of Mobile Applications through a Privacy Meter., , , and . ISPEC, volume 9065 of Lecture Notes in Computer Science, page 548-558. Springer, (2015)A Study on the LMS Platform Performance and Performance Improvement of K-MOOCs Platform from Learner's Perspective., and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 781-786. Springer, (2018)A Design of Demand Response Energy Optimization System for Micro Grid., and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 511-516. Springer, (2018)Designing 3D Propeller by Applying Bird's Wing and Making a Test Product., and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 811-817. Springer, (2018)Low-power shared memory architecture power mode for mobile system-on-chip., , , , and . IEICE Electron. Express, (2014)Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks., , , and . AsiaCCS, page 313-326. ACM, (2017)Assessing software integrity of virtual appliances through software whitelists., , , , , , and . NDSS, The Internet Society, (2013)SysPal: System-Guided Pattern Locks for Android., , , , , and . IEEE Symposium on Security and Privacy, page 338-356. IEEE Computer Society, (2017)Design of the Real-Time Mobile Push System for Implementation of the Shipboard Smart Working., , , , , , , , , and 2 other author(s). CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 541-548. Springer, (2015)Limiting Data Exposure in Monitoring Multi-domain Policy Conformance., , , and . TRUST, volume 7904 of Lecture Notes in Computer Science, page 65-82. Springer, (2013)