Author of the publication

An effective approach for injecting faults in wireless sensor network operating systems.

, , , and . ISCC, page 567-569. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An effective approach for injecting faults in wireless sensor network operating systems., , , and . ISCC, page 567-569. IEEE Computer Society, (2010)Measurements-Based Analysis of Workload-Error Relationship in a Production SaaS Cloud., , , and . ISSRE Workshops, page 96-105. IEEE Computer Society, (2012)Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol., , , , and . CSIIRW, page 5. ACM, (2013)Automated Generation of Performance and Dependability Models for the Assessment of Wireless Sensor Networks., , and . IEEE Trans. Computers, 61 (6): 870-884 (2012)LogDiver: A Tool for Measuring Resilience of Extreme-Scale Systems and Applications., , , , and . FTXS@HPDC, page 11-18. ACM, (2015)AVR-INJECT: A tool for injecting faults in Wireless Sensor Nodes., , , , and . IPDPS, page 1-8. IEEE, (2009)A survey on resiliency assessment techniques for wireless sensor networks., , , and . MOBIWAC, page 73-80. ACM, (2013)iCAAS: An Interoperable and Configurable Architecture for Accessing Sensor Networks., , and . IJARAS, 1 (2): 30-45 (2010)Analysis and Diagnosis of SLA Violations in a Production SaaS Cloud., , , , , and . ISSRE, page 178-188. IEEE Computer Society, (2014)Analyzing and modeling the failure behavior of Wireless Sensor Networks software under errors., , and . IWCMC, page 1136-1141. IEEE, (2012)