Author of the publication

Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria Approach.

, , , and . Information, 11 (5): 261 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exptime Tableaux for ALC., , and . Description Logics, volume WS-96-05 of AAAI Technical Report, page 107-110. AAAI Press, (1996)Diversity: A Poor Man's Solution to Drone Takeover., , and . PECCS, page 25-34. SciTePress, (2017)An Empirical Methodology to Evaluate Vulnerability Discovery Models., and . IEEE Trans. Software Eng., 40 (12): 1147-1162 (2014)Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned., , and . IEEE Trans. Emerg. Top. Comput., 4 (1): 35-46 (2016)Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria Approach., , , and . Information, 11 (5): 261 (2020)Verifying security protocols as planning in logic programming., and . ACM Trans. Comput. Log., 2 (4): 542-580 (2001)TestREx: a framework for repeatable exploits., , , and . Int. J. Softw. Tools Technol. Transf., 21 (1): 105-119 (2019)IT Interdependence and the Economic Fairness of Cybersecurity Regulations for Civil Aviation., , , , and . IEEE Secur. Priv., 13 (5): 52-61 (2015)DES: a Challenge Problem for Nonmonotonic Reasoning Systems, , and . CoRR, (2000)What the heck is this application doing? - A security-by-contract architecture for pervasive services., , , and . Comput. Secur., 28 (7): 566-577 (2009)