Author of the publication

Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms.

, , , , , and . BalkanCryptSec, volume 9024 of Lecture Notes in Computer Science, page 103-120. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scenarios for 5G mobile and wireless communications: the vision of the METIS project., , , , , , , , , and 4 other author(s). IEEE Communications Magazine, 52 (5): 26-35 (2014)5G Spectrum: enabling the future mobile landscape Guest Editorial., , , and . IEEE Communications Magazine, 53 (7): 16-17 (2015)Comparison of link to system interface models for WiMAX system., and . ICUMT, page 1-6. IEEE, (2011)A Novel Lifetime Extension Measure for Optimized Energy-Autonomous Wireless Backhaul Networks., , and . ISWCS, page 1-5. VDE-Verlag / IEEE, (2013)Reliability Modeling, Analysis and Prediction of Wireless Mobile Communications., and . VTC Spring, page 1-6. IEEE, (2014)Availability indication as key enabler for ultra-reliable communication in 5G., , , , and . EuCNC, page 1-5. IEEE, (2014)On the reliability of solar-powered point-to-point radio backhaul networks., , and . PIMRC, page 1753-1757. IEEE, (2014)Device-centric Energy Optimization for Edge Cloud Offloading., , , and . CoRR, (2017)Multiservice-based Network Slicing Orchestration with Impatient Tenants., , , , and . CoRR, (2019)A Controller for Network-Assisted CACC based Platooning., , and . CoRR, (2019)