Author of the publication

Security, trust, and QoS in next-generation control and communication for large power systems.

, , , , , , and . Int. J. Crit. Infrastructures, 4 (1/2): 3-16 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GridStat: High Availability, Low Latency, and Adaptive Sensor Data Delivery for Smart Generation and Transmission., , and . Smart Grids, CRC Press, (2014)Societal and Ethical Implications of Technology in Education., , , and . EDUCON, page 1-5. IEEE, (2023)Out-of-Band Authentication Model with Hashcash Brute-Force Prevention., and . HPCC/CSS/ICESS, page 794-801. IEEE, (2014)An assessment of the ICT Security Skills in the Industrial Sector as Provided Through Education and Training., , , and . MCIS, page 9. University of Nicosia / AISeL, (2016)An Investigation on the Application Developer Attitude Towards Greek Open Government Data., and . PCI, page 44. ACM, (2016)Security, trust, and QoS in next-generation control and communication for large power systems., , , , , , and . Int. J. Crit. Infrastructures, 4 (1/2): 3-16 (2008)Enhancing Dynamic-Content Courses with Student-Oriented Learning Strategies: The Case of Computer Security Course., and . Int. J. Cyber Ethics Educ., 2 (2): 24-33 (2012)An investigation on compliance with ISO 27001 in Cypriot private and public organisations.. Int. J. Serv. Stand., 7 (3/4): 197-234 (2011)DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems., , , , and . DPM/SETOP, volume 6514 of Lecture Notes in Computer Science, page 188-202. Springer, (2010)Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities., , , and . SECRYPT, page 546-553. INSTICC Press, (2008)