Author of the publication

A Protocol for Pervasive Distributed Computing Reliability.

, , , and . WiMob, page 574-579. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection., , , , and . FPS, volume 10723 of Lecture Notes in Computer Science, page 242-258. Springer, (2017)System policies for gradual tuning of security and workload in wireless sensor networks., , and . WTS, page 1-6. IEEE, (2011)Time Series Kernel Similarities for Predicting Paroxysmal Atrial Fibrillation from ECGs., , , , and . IJCNN, page 1-8. IEEE, (2018)Application-Driven Optimization of VLIW Architectures: A Hardware-Software Approach., , and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 128-137. IEEE Computer Society, (2005)A Protocol for Pervasive Distributed Computing Reliability., , , and . WiMob, page 574-579. IEEE Computer Society, (2008)A Friend or a Foe? Detecting Malware using Memory and CPU Features., , and . SECRYPT, page 73-84. SciTePress, (2016)A general practitioner or a specialist for your infected smartphone?, , and . CoRR, (2015)Run-time selection of security algorithms for networked devices., and . Q2SWinet, page 92-96. ACM, (2009)A design methodology for HW/SW security protocols.. University of Milan, Italy, (2006)Time, accuracy and power consumption tradeoff in mobile malware detection systems., , and . Comput. Secur., (2019)