Author of the publication

Towards Strategies for Secure Data Transfer of IoT Devices with Limited Resources.

, , and . DEXA Workshops, volume 1633 of Communications in Computer and Information Science, page 331-336. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework for simulation design of flexible manufacturing systems., , and . WSC, page 1106-1114. IEEE Computer Society, (1991)Representing and constructing system specifications using the system entity structure concepts., and . WSC, page 604-611. ACM Press, (1993)Applying knowledge-based system design and simulation in information system requirements determination., and . WSC, page 407-411. IEEE Computer Society, (1990)Systems theory instrumented simulation modeling.. WSC, page 282-286. ACM, (1988)Constraint-driven generation of model structures., and . WSC, page 604-611. ACM, (1987)Movement analysis in laparoscopic surgery training., , and . SummerSim, page 41. SCS/ ACM, (2014)Modeling of a transfer task in computer assisted surgical training., and . SpringSim (MSM), page 4. ACM, (2016)Embedded System Engineering Using C/C++ Based Design Methodologies., , , and . ECBS, page 81-88. IEEE Computer Society, (2005)Adapting Engineering Education to Resource-Constrained Middle Schools: Teaching Methodologies and Computing Technologies., , and . ECBS, page 258-262. IEEE Computer Society, (2010)Situation Assessment and Decision Making Integrated into the Process Centered Environment., , , , , , , and . ECBS, page 129-135. IEEE Computer Society, (1999)