Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PV-Battery-Biofuel Hybrid System for ZERO Fossil Fuel Electricity Generation on the Galapagos Islands, , , , , , , , and . (2011)Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol., , , and . LANOMS, page 69-72. IEEE, (2015)Path sampling, a robust alternative to gossiping for opportunistic network routing., , , and . WiMob, page 1-8. IEEE, (2016)Software for determining the true displacement of faults., , , and . Computers & Geosciences, (2014)An Analysis of Secure M2M Communication in WSNs Using DTLS., , and . ICDCS Workshops, page 78-83. IEEE Computer Society, (2016)A Survey on Wireless Sensors Networks Security Based on a Layered Approach., , , and . WWIC, volume 9071 of Lecture Notes in Computer Science, page 77-93. Springer, (2015)Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP Headers., , and . AINA, page 147-154. IEEE Computer Society, (2016)A monitoring-based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication., , , , and . IJAACS, 12 (3): 218-243 (2019)Cloud IEC 61850: Architecture and Integration of Electrical Automation Systems., , , and . SBESC, page 13-18. IEEE Computer Society, (2014)An Analysis of Secure M2M Communication in WSNs Using DTLS., , and . ICDCS Workshops, page 78-83. IEEE Computer Society, (2016)