About
8
Publications
319
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7
Citations
Introduction
Current institution
Publications
Publications (8)
Wireless Sensor Networks gradually became a mature technology that enabled the implementation of a large number of critical applications. However, the integration of such networks in much more complex systems, such as IoT, still poses a major challenge. In this paper we present a viable solution to accomplish such a difficult task by using MQTT-SN...
The security of Internet of Things (IoT) systems has consistently been a challenge, particularly in the context of critical infrastructure. One particular approach not yet employed in this domain is the unidirectional communication paradigm. This survey presents an analysis of the most prevalent unidirectional communication solutions, namely, data...
Steganography is the science that can hide
messages inside images, videos or sounds where the hiding
process is known by the sender and the receiver of the message.
In this paper we present the Message Processing-based
Steganographic Algorithm (MPSA), a new technique to conceal
the secret message in a pseudo-random way inside of the cover
object us...