Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experiencing Native Mobile Health Applications Development., and . CSCS, page 523-528. IEEE, (2017)A Review of Dynamic Resource Allocation in Edge and Fog Oriented Enterprise Systems., , and . CSCS, page 295-301. IEEE, (2021)Knowledge-based Education and Awareness about the Radiological and Nuclear Hazards., , and . KEOD, page 154-163. ScitePress, (2019)Secure Communication Method Based on Encryption and Steganography., , , , and . CSCS, page 453-458. IEEE, (2017)IoT Intrusion Detection: A Machine Learning Assessment., , , and . CSCS, page 307-312. IEEE, (2023)Secure IoT Gateway: The First Layer of Cybersecurity for Secure Infrastructure in Smart Cities., , and . ISC2, page 1-5. IEEE, (2023)Reengineering Indoor Air Quality Monitoring Systems to Improve End-User Experience., , , and . Sensors, 24 (8): 2659 (April 2024)Easy-to-Use MOX-Based VOC Sensors for Efficient Indoor Air Quality Monitoring., , , and . Sensors, 24 (8): 2501 (April 2024)Monitor Indoor Air Quality to Assess the Risk of COVID-19 Transmission., , , and . CSCS, page 356-361. IEEE, (2021)Knowledge and Decision Support for Hazard Awareness., , and . IC3K, volume 1297 of Communications in Computer and Information Science, page 343-364. Springer, (2019)