Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Solutions for deep packet inspection in industrial communications., , , and . COMM, page 153-158. IEEE, (2016)Vulnerability Remediation in ICS Infrastructure Based on Source Code Analysis., and . RoEduNet, page 1-6. IEEE, (2020)Contributions to content-based Software Defined Networks., , , and . COMM, page 159-162. IEEE, (2016)An analysis of the video capabilities of multiple antenna LTE networks., , , and . MACRo, page 87-95. Scientia Publishing House, (2017)Open Source Online Conference System for Industry Experts Participation in Education., , , and . IMCL, volume 1192 of Advances in Intelligent Systems and Computing, page 36-44. Springer, (2019)Business integration of industrial communications with Cloud computing., , , , and . COMM, page 1-4. IEEE, (2014)Demonstrator for voice communication over LTE., , , , and . COMM, page 1-4. IEEE, (2014)Network Automation and Abstraction using Python Programming Methods., , , and . MACRo, page 95-103. Scientia Publishing House, (2017)Enhanced Resource Management for Web Based Thin Clients Using Cross-Platform Progressive Offline Capabilities., , , , and . CrownCom, volume 291 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 361-372. Springer, (2019)Online Laboratory Access Control With Zero Trust Approach: Twingate Use Case., , , , , and . ECAI, page 1-7. IEEE, (2024)