Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DPKI: A Blockchain-Based Decentralized Public Key Infrastructure System., , , and . GIoTS, page 1-5. IEEE, (2020)ConSenseIoT: A Consensus Algorithm for Secure and Scalable Blockchain in the IoT context., and . ARES, page 103:1-103:6. ACM, (2022)The Computing Fleet: Managing Microservices-based Applications on the Computing Continuum., , , , , and . ICSA Companion, page 40-44. IEEE, (2022)Deep Convolutional Neural Networks for efficient vision based tunnel inspection., , , , and . ICCP, page 335-342. IEEE, (2015)Deep Learning-Based Man-Made Object Detection from Hyperspectral Data., , , and . ISVC (1), volume 9474 of Lecture Notes in Computer Science, page 717-727. Springer, (2015)Integrated Solution for Industrial IoT Data Security - the CHARIOT Solution., , , , , , , , , and 8 other author(s). SAM IoT, volume 2739 of CEUR Workshop Proceedings, page 11-18. CEUR-WS.org, (2020)An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management., , , , , , , , , and 10 other author(s). ARES, page 98:1-98:6. ACM, (2023)Robotic intelligent vision and control for tunnel inspection and evaluation - The ROBINSPECT EC project., , , , , , , , , and 3 other author(s). ROSE, page 72-77. IEEE, (2014)Variational Inference for Background Subtraction in Infrared Imagery., , and . ISVC (1), volume 9474 of Lecture Notes in Computer Science, page 693-705. Springer, (2015)Cognition Enabled IoT Platform for Industrial IoT Safety, Security and Privacy - The CHARIOT Project., , , , , , , , , and 3 other author(s). CAMAD, page 1-4. IEEE, (2019)