Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formalization of security patterns as a means to infer security controls in business processes., and . Logic Journal of the IGPL, 23 (1): 57-72 (2015)ELI: an IoT-aware big data pipeline with data curation and data quality., , , , and . PeerJ Comput. Sci., (2023)A Framework to Secure the Development and Auditing of SSL Pinning in Mobile Applications: The Case of Android Devices., , , , and . Entropy, 21 (12): 1136 (2019)OPBUS: A framework for improving the dependability of risk-aware business processes.. AI Commun., 29 (1): 233-235 (2015)BIGOWL4DQ: Ontology-driven approach for Big Data quality meta-modelling, selection and reasoning., , , , , and . Inf. Softw. Technol., (March 2024)Enabling process mining in aircraft manufactures: extracting event logs and discovering processes from complex data., , , , and . BPM (Industry Forum), volume 2428 of CEUR Workshop Proceedings, page 166-177. CEUR-WS.org, (2019)A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes., , , , and . CISIS/ICEUTE/SOCO Special Sessions, volume 189 of Advances in Intelligent Systems and Computing, page 13-23. Springer, (2012)CombiS-BP editor: Combining declarative and imperative languages in BP modelling: Demonstration paper., , , and . RCIS, page 1-2. IEEE, (2013)FABIOLA: Defining the Components for Constraint Optimization Problems in Big Data Environment., , , and . ISD, Association for Information Systems, (2017)Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets., , , and . SECURWARE, page 53-61. IEEE Computer Society, (2008)