Author of the publication

Integrating machine-to-machine measurement framework into oneM2M architecture.

, , , and . APNOMS, page 364-367. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Boudaoud, Karima
add a person with the name Boudaoud, Karima
 

Other publications of authors with the same name

Applying Internet of Things for personalized healthcare in smart homes., , , , and . WOCC, page 164-169. IEEE, (2015)Policy-driven model for security management., and . Net-Con, volume 235 of IFIP Conference Proceedings, page 419-424. Kluwer, (2002)Network security management with intelligent agents., , , and . NOMS, page 579-592. IEEE, (2000)The STAC (security toolbox: attacks & countermeasures) ontology., , and . WWW (Companion Volume), page 165-166. International World Wide Web Conferences Steering Committee / ACM, (2013)A Component-Based Approach to Security Protocol Design., , , and . AINA Workshops, page 279-284. IEEE Computer Society, (2011)Designing Security Protocols Adapted to the Constraints of Mobile Environments., , , and . EUC, page 624-629. IEEE Computer Society, (2010)A low-energy consuming and user-centric security management architecture adapted to mobile environments., , , and . Integrated Network Management, page 722-725. IEEE, (2011)An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture., , and . iThings/GreenCom/CPSCom, page 109-116. IEEE Computer Society, (2014)Demo Paper: Helping IoT Application Developers with Sensor-based Linked Open Rules., , and . TC/SSN@ISWC, volume 1401 of CEUR Workshop Proceedings, page 105-108. CEUR-WS.org, (2014)A middleware for securing mobile mashups., , and . WWW (Companion Volume), page 9-10. ACM, (2011)