Author of the publication

Data Collection Framework - A Flexible and Efficient Tool for Heterogeneous Data Acquisition.

, , , , , and . CLOSER (1), page 374-379. SciTePress, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Cloud-Based SCADA Application: The Use Case of a Water Supply Network., , , , and . SoMeT, volume 286 of Frontiers in Artificial Intelligence and Applications, page 291-301. IOS Press, (2016)Securing the weak link of federated systems via trusted execution: a case study from the eHealth domain., , , , and . Int. J. Crit. Comput. Based Syst., 9 (4): 293-317 (2019)Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions., , , , and . COMPSAC (2), page 510-515. IEEE Computer Society, (2017)978-1-5386-0367-3.Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns., , , , , and . 3PGCIC, page 713-717. IEEE Computer Society, (2015)An Approach for Securing Critical Applications in Untrusted Clouds., , , , , and . PDP, page 436-440. IEEE Computer Society, (2018)Hardening ROS via Hardware-assisted Trusted Execution Environment., , and . RO-MAN, page 491-494. IEEE, (2018)Protecting Critical Business Processes of Smart Hospitals from Cyber Attacks., , , , , and . SITIS, page 363-367. IEEE, (2019)Critical Infrastructure Protection: having SIEM technology cope with network heterogeneity., , , and . CoRR, (2014)An abstract reasoning architecture for privacy policies monitoring., , , , , and . Future Gener. Comput. Syst., (2020)A GDPR-Compliant Approach to Real-Time Processing of Sensitive Data., and . IIMSS, volume 98 of Smart Innovation, Systems and Technologies, page 43-52. Springer, (2018)