Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Broadcast anonymous routing (BAR): scalable real-time anonymous communication., , and . Int. J. Inf. Sec., 16 (3): 313-326 (2017)Process-Aware Attacks on Medication Control of Type-I Diabetics Using Infusion Pumps., , , and . IEEE Syst. J., 17 (2): 1831-1842 (June 2023)A Hierarchical Multi Blockchain for Fine Grained Access to Medical Data., , , and . IEEE Access, (2020)Association Attacks in IEEE 802.11: Exploiting WiFi Usability Features., and . STAST, volume 11739 of Lecture Notes in Computer Science, page 107-123. Springer, (2019)Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects., , and . CRITIS, volume 6983 of Lecture Notes in Computer Science, page 104-115. Springer, (2011)Blockchain Service Layer for ERP data interoperability among multiple supply chain stakeholders., , , and . CoDIT, page 145-150. IEEE, (2023)An Experimental Analysis of Current DDoS attacks Based on a Provider Edge Router Honeynet., , and . IISA, page 1-5. IEEE, (2019)Performance Analysis of a Hybrid Key Establishment Protocol for Wireless Sensor Networks., , and . ISM, page 719-724. IEEE Computer Society, (2005)Assessing Vulnerabilities and IoT-Enabled Attacks on Smart Lighting Systems., , and . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, volume 13106 of Lecture Notes in Computer Science, page 199-217. Springer, (2021)TS-LoRa: Time-slotted LoRaWAN for the Industrial Internet of Things., , , and . Comput. Commun., (2020)