Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud., , , and . SITIS, page 527-532. IEEE Computer Society, (2012)An event correlation approach for fault diagnosis in SCADA infrastructures., , , , and . EWDC, page 15-20. ACM, (2011)Distributed Framework for Cybersecurity of Critical Infrastructures, , , and . Effective Surveillance for Homeland Security: Balancing Technology and Social Issues, (2013)Security Engineering of SOA Applications Via Reliability Patterns., , and . J. Softw. Eng. Appl., 4 (1): 1-8 (2011)Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study., , , and . Technol. Anal. Strateg. Manag., 33 (8): 900-913 (2021)Detection of Radio Frequency Interference in Satellite Ground Segments., , , , , , and . CSR, page 648-653. IEEE, (2023)A hidden Markov model based intrusion detection system for wireless sensor networks., , , and . Int. J. Crit. Comput. Based Syst., 3 (3): 210-228 (2012)QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach., , , , and . Euro-Par Workshops (1), volume 7155 of Lecture Notes in Computer Science, page 15-24. Springer, (2011)An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems., , , , and . NBiS, volume 22 of Lecture Notes on Data Engineering and Communications Technologies, page 952-959. Springer, (2018)Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach., , , , , , , , , and 12 other author(s). IDCS, volume 11874 of Lecture Notes in Computer Science, page 318-327. Springer, (2019)