Author of the publication

Impact of Policy Design on Workflow Resiliency Computation Time.

, , and . QEST, volume 9259 of Lecture Notes in Computer Science, page 244-259. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review., and . CoRR, (2021)WRAD: Tool Support for Workflow Resiliency Analysis and Design., , and . SERENE, volume 9823 of Lecture Notes in Computer Science, page 79-87. Springer, (2016)Modeling and analysis of influence power for information security decisions., , and . Perform. Evaluation, (2016)Impact of Using a Privacy Model on Smart Buildings Data for CO2 Prediction., , , , , and . DBSec, volume 13942 of Lecture Notes in Computer Science, page 133-140. Springer, (2023)On Attribute Retrieval in ABAC., , and . FPS, volume 12056 of Lecture Notes in Computer Science, page 225-241. Springer, (2019)Interventions over smart card swiping behaviour., , and . STAST, page 2:1-2:11. ACM, (2018)State Based Robustness Testing for Components., , , and . FACS, volume 260 of Electronic Notes in Theoretical Computer Science, page 173-188. Elsevier, (2008)Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems., and . STM, volume 10547 of Lecture Notes in Computer Science, page 224-233. Springer, (2017)Modelling user availability in workflow resiliency analysis., , and . HotSoS, page 7:1-7:10. ACM, (2015)Subjective review-based reputation., , and . SAC, page 2029-2034. ACM, (2012)