Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JPEG steganography detection with Benford's Law., , and . Digital Investigation, 9 (3-4): 246-257 (2013)Engineering secure systems with ISO 26702 and 27001., , , and . SoSE, page 1-6. IEEE, (2010)Introduction to the Special Theme - Future Cities and Smart Technologies: A Landscape of Ambition and Caution., and . ERCIM News, (2014)Exploring Potential 6LoWPAN Traffic Side Channels., , and . IACR Cryptol. ePrint Arch., (2017)A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things., , , , and . IEEE Trans. Ind. Informatics, 10 (2): 1461-1468 (2014)An urban sensing architecture as essential infrastructure for future cities., , and . UCC Companion, page 37:1-37:3. ACM, (2021)Migrating To The Cloud: Lessons And Limitations Of 'Traditional' IS Success Models., , and . CSER, volume 16 of Procedia Computer Science, page 737-746. Elsevier, (2013)On the Development of Automated Forensic Analysis Methods for Mobile Devices., , , , , , , and . TRUST, volume 8564 of Lecture Notes in Computer Science, page 212-213. Springer, (2014)Physical layer secret-key generation with discreet cosine transform for the Internet of Things., , , , , and . ICC, page 1-6. IEEE, (2017)A viable systems approach towards cyber situational awareness., , and . SMC, page 1405-1411. IEEE, (2014)