Author of the publication

Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private Networks.

, , and . ICCCN, page 1-11. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DIAMOnDS - DIstributed Agents for MObile & Dynamic Services, , , , , , , and . CoRR, (2003)How have we evaluated software pattern application? A systematic mapping study of research design practices., , and . Inf. Softw. Technol., (2015)To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment., , , and . Empir. Softw. Eng., 22 (5): 2684-2717 (2017)Identifying the implied: Findings from three differentiated replications on the use of security requirements templates., , , , , , and . Empir. Softw. Eng., 22 (4): 2127-2178 (2017)Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware Approach., , , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 1096-1105. Springer, (2005)Quality-aware trajectory planning of cellular connected UAVs., , , , , , and . DroneCom@MOBICOM, page 79-85. ACM, (2020)Grid Access Middleware for Handheld Devices., , , , and . EGC, volume 3470 of Lecture Notes in Computer Science, page 1002-1011. Springer, (2005)Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private Networks., , and . ICCCN, page 1-11. IEEE, (2020)Towards a framework to measure security expertise in requirements analysis., , , and . ESPRE, page 13-18. IEEE Computer Society, (2014)A Distributed Middleware Solution for Context Awareness in Ubiquitous Systems., , , , and . RTCSA, page 451-454. IEEE Computer Society, (2005)