Author of the publication

CRAM: Robust Medium Access Control for LPWAN using Cryptographic Frequency Hopping.

, , , , , and . DCOSS, page 95-102. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decentralized cooperative management: a bottom-up approach., , , and . IADIS AC, page 401-408. IADIS, (2005)Real-time Distributed In-Situ Benchmarking of Energy Harvesting IoT Devices., , , and . M4IoT@Middleware, page 19-24. ACM, (2018)Improving Memory Management Security for C and C++., , , and . Int. J. Secur. Softw. Eng., 1 (2): 57-82 (2010)Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication., , , and . IWSPA@CODASPY, page 2-12. ACM, (2022)ThunQ: A Distributed and Deep Authorization Middleware for Early and Lazy Policy Enforcement in Microservice Applications., , , , and . ICSOC, volume 13121 of Lecture Notes in Computer Science, page 204-220. Springer, (2021)Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018., , , , and . CNS, page 254-262. IEEE, (2022)Expressive and Systematic Risk Assessments with Instance-Centric Threat Models., , and . SAC, page 1450-1457. ACM, (2023)A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components., , , and . Communications and Multimedia Security, volume 175 of IFIP, page 125-130. Springer, (2004)Developing and managing customizable Software as a Service using feature model conversion., , , , , and . NOMS, page 1295-1302. IEEE, (2012)Privacy-Preserving Behavioral Authentication on Smartphones., , , and . HumanSys@SenSys, page 1-6. ACM, (2017)