Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Whole exome sequencing analysis pipeline for the discovery of mutations causative of human rare diseases., , , , , , , , , and 1 other author(s). IWBBIO, page 253-254. Copicentro Editorial, (2013)Characterizing Normal and Pathological Gait through Permutation Entropy., , , , , , and . Entropy, 20 (1): 77 (2018)Modeling and Simulation of Upper Brachial Plexus Injury., , , , , and . IEEE Syst. J., 10 (3): 912-921 (2016)Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid Systems., , and . IEICE Trans. Inf. Syst., 94-D (2): 243-254 (2011)Special Issue: Securing Distributed Networks and Systems., , , and . Concurr. Comput. Pract. Exp., 23 (12): 1311-1312 (2011)Analysis of location privacy solutions in wireless sensor networks., and . IET Commun., 5 (17): 2518-2532 (2011)Next generation wireless communications and mobile computing/networking technologies., and . Wirel. Commun. Mob. Comput., 9 (4): 441-443 (2009)Trust & security RTD in the internet of things: opportunities for international cooperation., , , , and . SECURIT, page 172-178. ACM, (2012)Trust, Privacy and Security in E-Business: Requirements and Solutions., , and . Panhellenic Conference on Informatics, volume 3746 of Lecture Notes in Computer Science, page 548-558. Springer, (2005)Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems., , , , , and . TrustBus, volume 5695 of Lecture Notes in Computer Science, page 86-94. Springer, (2009)