Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special issue on security of IoT-enabled infrastructures in smart cities., , , and . Ad Hoc Networks, (2019)Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network., , , and . IEEE Trans. Cybernetics, 46 (8): 1749-1759 (2016)Digital investigations for IPv6-based Wireless Sensor Networks., , , , and . Digital Investigation, 11 (S-2): S66-S75 (2014)Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks., , and . WISTP, volume 7886 of Lecture Notes in Computer Science, page 34-49. Springer, (2013)"Come Together!": Interactions of Language Networks and Multilingual Communities on Twitter., , and . ICCCI (2), volume 10449 of Lecture Notes in Computer Science, page 469-478. Springer, (2017)Popularity and Geospatial Spread of Trends on Twitter: A Middle Eastern Case Study., , , and . ICCCI (1), volume 11055 of Lecture Notes in Computer Science, page 167-177. Springer, (2018)Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps., , and . HCI (27), volume 8030 of Lecture Notes in Computer Science, page 209-216. Springer, (2013)The Smart City from a Public Value Perspective., , and . ICT4S, Atlantis Press, (2014)Optimized Certificate Revocation List Distribution for Secure V2X Communications., , , , and . VTC-Fall, page 1-7. IEEE, (2017)Smart data-harnessing for financial value in short-term hire electric car schemes., , and . SoSE, page 374-379. IEEE, (2015)