Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving expected tail loss estimates with neural networks., , and . Intell. Syst. Account. Finance Manag., 13 (2): 81-94 (2005)Onto-CARMEN: Ontology-driven approach for Cyber-Physical System Security Requirements meta-modelling and reasoning., , , , and . Internet Things, (December 2023)Security policies by design in NoSQL document databases., , , , , , , and . J. Inf. Secur. Appl., (2022)An ontology-based secure design framework for graph-based databases., , , , , and . Comput. Stand. Interfaces, (March 2024)Infinite Continuous Feature Model for Psychiatric Comorbidity Analysis., , , , and . Neural Comput., 28 (2): 354-381 (2016)An MDA approach for developing secure OLAP applications: Metamodels and transformations., , , and . Comput. Sci. Inf. Syst., 12 (2): 541-565 (2015)Minimizing incident response time in real-world scenarios using quantum computing., , , , , , , and . Softw. Qual. J., 32 (1): 163-192 (March 2024)How the Conceptual Modelling Improves the Security on Document Databases., , , , , and . ER, volume 11157 of Lecture Notes in Computer Science, page 497-504. Springer, (2018)Towards a Quantum World in Cybersecurity Land., , , , , and . IS-EUD Workshops, volume 3408 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Obtaining Secure Code in SQL Server Analysis Services by using MDA and QVT., , , , and . WOSIS, page 38-48. INSTICC Press, (2008)