Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Serving embedded content via web applications: model, design and experimentation., , and . EMSOFT, page 117-126. ACM, (2009)IoT Forensic: identification and classification of evidence in criminal investigations., , and . ARES, page 60:1-60:9. ACM, (2018)Toward Energy Profiling of Connected Embedded Systems., , , and . NTMS, page 1-4. IEEE, (2016)An object memory management solution for small devices with heterogeneous memories., and . WISES, page 227-237. IEEE, (2007)EE-CFI: Externalized Control Flow Integrity for Embedded Devices., , and . IMIS, volume 612 of Advances in Intelligent Systems and Computing, page 321-329. Springer, (2017)ZBDS2023: A multi location Zigbee dataset to build innovative IoT Intrusion Detection Systems., , and . WiMob, page 84-91. IEEE, (2023)The Web of Things: Interconnecting Devices with High Usability and Performance., , and . ICESS, page 323-330. IEEE Computer Society, (2009)Nested compartmentalisation for constrained devices., , and . FiCloud, page 334-341. IEEE, (2021)Forensic analysis of IoT ecosystem., , and . FiCloud, page 115-122. IEEE, (2021)Bringing Worst Case Execution Time Awareness to an Open Smart Card OS., , and . RTCSA, page 497-503. IEEE Computer Society, (2007)