Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Current State of Honeypots and Deception Strategies in Cybersecurity., , and . ICUMT, page 1-9. IEEE, (2019)IP Traffic Generator Using Container Virtualization Technology., , , , , , , , and . ICUMT, page 1-6. IEEE, (2018)Experimental measurements of noise influence on narrowband Power Line Communication., , , and . ICUMT, page 94-100. IEEE, (2016)Application Perspective on Cybersecurity Testbed for Industrial Control Systems., , , , and . Sensors, 21 (23): 8119 (2021)Analysis and detection of application-independent slow Denial of Service cyber attacks., , and . ISI, page 1-6. IEEE, (2021)Investigation of Power Line Communication and Wi-Fi Co-existence in Smart Home., , , , , , and . ICUMT, page 1-4. IEEE, (2018)Advanced optimization method for improving the urban traffic management., , , , and . FRUCT, page 48-53. IEEE, (2016)Analytical Evaluation of D2D Connectivity Potential in 5G Wireless Systems., , , , , , and . NEW2AN, volume 9870 of Lecture Notes in Computer Science, page 395-403. Springer, (2016)Managing the Secure Software Development., , , , , , and . NTMS, page 1-4. IEEE, (2019)On Track of Sigfox Confidentiality with End-to-End Encryption., , , , , , and . ARES, page 19:1-19:6. ACM, (2018)