Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users., , and . Certification and Security in E-Services, volume 255 of IFIP Conference Proceedings, page 149-164. Kluwer, (2002)Software-as-a-Service in the Telecommunication Industry: Problems and Opportunities., , and . ICSOB, volume 51 of Lecture Notes in Business Information Processing, page 138-150. Springer, (2010)Defining an Internet-of-Things Ecosystem., , and . NEW2AN, volume 7469 of Lecture Notes in Computer Science, page 1-14. Springer, (2012)Applying Wavelet Packet Decomposition and One-Class Support Vector Machine on Vehicle Acceleration Traces for Road Anomaly Detection., , , , , , and . ISNN (1), volume 7951 of Lecture Notes in Computer Science, page 291-299. Springer, (2013)Cost Efficiency of Hybrid Cloud Storage: Shortening Acquisition Cycle to Mitigate Volume Variation., , and . ICIS, Association for Information Systems, (2015)Evaluating Classifiers for Mobile-Masquerader Detection., , and . SEC, volume 201 of IFIP, page 271-283. Springer, (2006)Hybrid Cloud Architecture for Short Message Services., , , , and . CLOSER, page 489-500. SciTePress, (2012)A framework for evaluating Internet-of-Things platforms: Application provider viewpoint., and . WF-IoT, page 147-152. IEEE Computer Society, (2014)Information Security Culture: A Survey., and . INC, page 153-157. University of Plymouth, (2010)Analyzing Impact of Interface Implementation Efforts on the Structure of a Software Market - OSS/BSS Market Polarization Scenario., , and . ICSOFT (SE/MUSE/GSDCA), page 80-87. INSTICC Press, (2008)