Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to provision and manage off-the-shelf SIP phones in domestic and SOHO environments., , , , , , and . LCN, page 42-49. IEEE Computer Society, (2011)Improving network security monitoring for industrial control systems., , , , , , and . IM, page 878-881. IEEE, (2015)Attacking SCADA systems: A practical perspective., , , , and . IM, page 741-746. IEEE, (2017)CulturalNature Arga #2., , and . IJCICG, 5 (1): 21-31 (2014)A Distributed IDS for Industrial Control Systems., , , , , , and . IJCWT, 4 (2): 1-22 (2014)Outsourced management of home and SOHO Windows desktops., , , , and . CNSM, page 1-7. IEEE, (2011)Enabling PreOS Desktop Management., and . Integrated Network Management, volume 246 of IFIP Conference Proceedings, page 321-334. Kluwer, (2003)A management framework for residential broadband environments., and . IM, page 934-940. IEEE, (2013)A stealth monitoring mechanism for cyber-physical systems., , , and . IJCIP, (2019)Keeping an Eye on Your Security Through Assurance Indicators., , , , , , and . SECRYPT, page 476-483. SciTePress, (2014)