Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Whole exome sequencing analysis pipeline for the discovery of mutations causative of human rare diseases., , , , , , , , , and 1 other author(s). IWBBIO, page 253-254. Copicentro Editorial, (2013)Modeling and Simulation of Upper Brachial Plexus Injury., , , , , and . IEEE Syst. J., 10 (3): 912-921 (2016)A Comprehensive Methodology for Deploying IoT Honeypots., , , and . TrustBus, volume 11033 of Lecture Notes in Computer Science, page 229-243. Springer, (2018)Security assurance during the software development cycle., , and . CompSysTech, page 20. ACM, (2009)IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations., , and . Sensors, 18 (2): 492 (2018)Modelling trust dynamics in the Internet of Things., , and . Inf. Sci., (2017)Towards Automatic Critical Infrastructure Protection through Machine Learning., , and . CRITIS, volume 8328 of Lecture Notes in Computer Science, page 197-203. Springer, (2013)Modeling Malware-driven Honeypots., , and . TrustBus, volume 10442 of Lecture Notes in Computer Science, page 130-144. Springer, (2017)A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI., , , and . ISC, volume 2433 of Lecture Notes in Computer Science, page 136-149. Springer, (2002)Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication., , , and . CANS, volume 4856 of Lecture Notes in Computer Science, page 265-281. Springer, (2007)