Rosslin John Robles

Orcid: 0000-0002-9069-8240

According to our database1, Rosslin John Robles authored at least 14 papers between 2008 and 2011.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2011
Security Encryption Schemes for Internet SCADA: Comparison of the Solutions.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2011

Retrofit to CAIN Issues for Critical Infrastructures.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2011

Securing Communication between SCADA Master Station and Mobile Remote Components.
Proceedings of the Information Security and Assurance - International Conference, 2011

Application Program Interface as Back-Up Data Source for SCADA Systems.
Proceedings of the Information Security and Assurance - International Conference, 2011

A Study on Domain Name System as Lookup Manager for Wireless/Mobile Systems in IPv6 Networks.
Proceedings of the Security Technology, 2011

2010
Model Based User's Access Requirement Analysis of E-Governance Systems.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Context Aware Systems, Methods and Trends in Smart Home Technology.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Internet SCADA Utilizing API's as Data Source.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Security Encryption Scheme for Communication of Web Based Control Systems.
Proceedings of the Signal Processing and Multimedia, 2010

Communication Security for Control Systems in Smart Grid.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Feature Extraction and Analysis of Breast Cancer Specimen.
Proceedings of the Advanced Communication and Networking - Second International Conference, 2010

2009
Symmetric-Key Encryption for Wireless Internet SCADA.
Proceedings of the Security Technology, 2009

Crossed Crypto-Scheme in WPA PSK Mode.
Proceedings of the 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009

2008
Online Games and Security Issues.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008


  Loading...