Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enterprise Data Quality: A Pragmatic Approach., , , , and . Inf. Syst. Frontiers, 1 (3): 279-301 (1999)Multidatabase Interdependencies in Industry., and . SIGMOD Conference, page 483-486. ACM Press, (1993)Zero-Day Attack Identification in Streaming Data Using Semantics and Spark., , , , and . BigData Congress, page 121-128. IEEE Computer Society, (2017)Using Context in Semantic Data Integration. IBIS - International Journal of Interoperability in Business Information Systems, 1 (3): 9-22 (December 2006)Searching for relevant software change artifacts using semantic networks., , , , and . SAC, page 496-500. ACM, (2009)Measuring Software Security Using Improved CWE Base Score., , and . CIKM Workshops, volume 3052 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)Beyond data: contextual information fusion for cyber security analytics., and . SAC, page 73-79. ACM, (2016)Semantic integration of government data for water quality management., , , , and . Gov. Inf. Q., 24 (4): 716-735 (2007)Toward Zero-Day Attack Identification Using Linear Data Transformation Techniques., and . SERE, page 159-168. IEEE, (2013)SDN-GAN: Generative Adversarial Deep NNs for Synthesizing Cyber Attacks on Software Defined Networks., and . OTM Workshops, volume 11878 of Lecture Notes in Computer Science, page 211-220. Springer, (2019)