Author of the publication

Secure cloud computing: Continuous anomaly detection approach in legal metrology.

, , , and . I2MTC, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Methods for certification of GNSS-based safe vehicle localisation in driving assistance systems., , and . ICCVE, page 226-231. IEEE, (2015)Accuracy analysis of BeiDou receivers for lane detection applications., , , , , and . PLANS, page 179-184. IEEE, (2016)Towards FAIR Research Data in Metrology., , , , , , and . CoRDI, TIB Open Publishing, (2023)Representation of Attacker Motivation in Software Risk Assessment Using Attack Probability Trees., , and . FedCSIS, volume 11 of Annals of Computer Science and Information Systems, page 763-771. (2017)Development of Intelligent GNSS-based Land Vehicle Localisation Systems (Entwicklung intelligenter GNSS-basierten Landfahrzeug Lokalisierungssysteme). Braunschweig University of Technology, Germany, (2015)base-search.net (ftunivbraunschw:oai:https://leopard.tu-braunschweig.de/:dbbs_mods_00061982).Developing Defense Strategies from Attack Probability Trees in Software Risk Assessment., and . FedCSIS, volume 21 of Annals of Computer Science and Information Systems, page 527-536. (2020)Investigation into the Applicability of Software Requirements from Legal Metrology to Sensor Networks., , and . I2MTC, page 1-6. IEEE, (2022)Towards a Digital Twin for Air Quality Monitoring Networks in Smart Cities., and . ISC2, page 1-4. IEEE, (2022)Secure Cloud Computing: Communication Protocol for Multithreaded Fully Homomorphic Encryption for Remote Data Processing., , , and . ISPA/IUCC, page 503-510. IEEE, (2017)Formalization of Software Risk Assessment Results in Legal Metrology Based on ISO/IEC 18045 Vulnerability Analysis., , and . FedCSIS, volume 18 of Annals of Computer Science and Information Systems, page 443-447. (2019)