Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyberattacks and Countermeasures For In-Vehicle Networks., , , and . CoRR, (2020)Synthesising Privacy by Design Knowledge Towards Explainable Internet of Things Application Designing in Healthcare., , , , , and . CoRR, (2020)A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade., , , , , , , , , and 15 other author(s). ACM Comput. Surv., 51 (5): 105:1-105:38 (2019)Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication., , , , and . Comput. Secur., (2023)Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk., , and . Comput. Secur., (2016)Using the blockchain to enable transparent and auditable processing of personal data in cloud- based services: Lessons from the Privacy-Aware Cloud Ecosystems (PACE) project., , and . Comput. Law Secur. Rev., (November 2023)Cloud Market Maker: An automated dynamic pricing marketplace for cloud users., , , , and . Future Gener. Comput. Syst., (2016)A catallactic market for data mining services., , , , , , and . Future Gener. Comput. Syst., 23 (1): 146-153 (2007)The management of cloud systems., and . Future Gener. Comput. Syst., (2014)Network-aware summarisation for resource discovery in P2P-content networks., , , , and . Future Gener. Comput. Syst., 28 (3): 563-572 (2012)