Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating Reactive Cloud Applications in SERECA., , , , and . ARES, page 39:1-39:8. ACM, (2017)A Model-Based Observer for Intelligent Tire Concepts., , and . RTSI, page 447-452. IEEE, (2019)QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud., , , and . SITIS, page 527-532. IEEE Computer Society, (2012)An event correlation approach for fault diagnosis in SCADA infrastructures., , , , and . EWDC, page 15-20. ACM, (2011)International Cooperation Experiences: Results Achieved, Lessons Learned, and Way Ahead., , , and . SAFECOMP Workshops, volume 7613 of Lecture Notes in Computer Science, page 259-270. Springer, (2012)Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study., , , and . Technol. Anal. Strateg. Manag., 33 (8): 900-913 (2021)Security Engineering of SOA Applications Via Reliability Patterns., , and . J. Softw. Eng. Appl., 4 (1): 1-8 (2011)A hidden Markov model based intrusion detection system for wireless sensor networks., , , and . Int. J. Crit. Comput. Based Syst., 3 (3): 210-228 (2012)SGXTuner: Performance Enhancement of Intel SGX Applications Via Stochastic Optimization., , , and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2595-2608 (2022)Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach., , , , , , , , , and 12 other author(s). IDCS, volume 11874 of Lecture Notes in Computer Science, page 318-327. Springer, (2019)