Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable and Secure Group Rekeying in Wireless Sensor Networks., and . Parallel and Distributed Computing and Networks, page 84-88. IASTED/ACTA Press, (2006)An Overview of VOAC, a Virtual Organizations Access Control Infrastructure., and . Parallel and Distributed Computing and Networks, page 29-34. IASTED/ACTA Press, (2006)A Social-Feedback Enriched Interface for Software Download., , , and . JOEUC, 25 (1): 24-42 (2013)Consensus-based distributed intrusion detection for multi-robot systems., , , , and . ICRA, page 120-127. IEEE, (2008)A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems., and . MESAS, volume 8906 of Lecture Notes in Computer Science, page 77-94. Springer, (2014)Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi-Agent Systems., , , , and . CASE, page 454-459. IEEE, (2007)Social and Q&A interfaces for app download., , , and . Inf. Process. Manag., 50 (4): 584-598 (2014)Protected pointers in wireless sensor networks., and . Int. J. Ad Hoc Ubiquitous Comput., 24 (3): 204-212 (2017)JAMMY: A Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs., , , , and . IEEE Trans. Dependable Secur. Comput., 14 (4): 392-405 (2017)Distributed Intrusion Detection for the Security of Societies of Robots, , and . CoRR, (2011)