Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring Data Analytics of Data Variety., , and . WorldCIST (2), volume 746 of Advances in Intelligent Systems and Computing, page 920-930. Springer, (2018)Evolving L-Systems with Musical Notes., , , , and . EvoMUSART, volume 9596 of Lecture Notes in Computer Science, page 186-201. Springer, (2016)Current and Future Trends in Mobile Device Forensics: A Survey., , , and . ACM Comput. Surv., 51 (3): 46:1-46:31 (2018)Integrated protection of industrial control systems from cyber-attacks: the ATENA approach., , , , , , , , , and 8 other author(s). Int. J. Crit. Infrastructure Prot., (2018)A Network Intrusion Detection System for Building Automation and Control Systems., , and . IEEE Access, (2023)Using UPnP-CWMP integration for operator-assisted management of domestic LANs., , , , , and . CCNC, page 73-78. IEEE, (2012)Enabling PreOS Desktop Management., and . Integrated Network Management, volume 246 of IFIP Conference Proceedings, page 321-334. Kluwer, (2003)A management framework for residential broadband environments., and . IM, page 934-940. IEEE, (2013)Integration of PXE-based desktop solutions into broadband access networks., , , and . CNSM, page 182-189. IEEE, (2010)Outsourced management of home and SOHO Windows desktops., , , , and . CNSM, page 1-7. IEEE, (2011)