Author of the publication

Energy-aware adaptive security management for wireless sensor networks.

, , , and . WoWMoM, page 1-4. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to abuse biometric passport systems., , and . J. Inf., Comm, Ethics in Society, 10 (2): 68-81 (2012)Automobile Automation and Lifecycle: How Digitalisation and Security Issues Affect the Car as a Product and Service?, and . IntelliSys (2), volume 1038 of Advances in Intelligent Systems and Computing, page 121-137. Springer, (2019)Energy-aware adaptive security management for wireless sensor networks., , , and . WoWMoM, page 1-4. IEEE Computer Society, (2014)Security, privacy'); drop table users; - and forced trust in the information age?: when trusting an information system is not optional and why it matters., , , and . SIGCAS Comput. Soc., 47 (4): 68-80 (2018)Enhancing a cybersecurity curriculum development tool with a competence framework to meet industry needs for cybersecurity., and . CompSysTech, page 123-128. ACM, (2023)Personal data protection in the age of mass surveillance., and . J. Comput. Secur., 30 (2): 265-289 (2022)Incubator Platform for Multidisciplinary Innovation in Research and Education., , , , , , and . Int. J. Knowl. Soc. Res., 3 (3): 29-44 (2012)Cybersecurity Education and Skills: Exploring Students' Perceptions, Preferences and Performance in a Blended Learning Initiative., , , and . EDUCON, page 1361-1369. IEEE, (2020)Battle of the Bands: A Long-Term Analysis of Frequency Band and Channel Distribution Development in WLANs., , and . IEEE Access, (2022)A systematic methodology for continuous WLAN abundance and security analysis., , and . Comput. Networks, (2021)