From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Vulnerability Assessment Approach for Transportation Networks Subjected to Cyber-Physical Attacks., , , и . Future Internet, 15 (3): 100 (марта 2023)Digital Age of Consent and Age Verification: Can They Protect Children?, , , , и . IEEE Softw., 39 (3): 50-57 (2022)Live goals for adaptive service compositions., и . SEAMS, стр. 114-123. ACM, (2010)Compositional verification of self-adaptive cyber-physical systems., , , и . SEAMS@ICSE, стр. 1-11. ACM, (2018)IRET: Requirements for service platforms., , и . RE, стр. 336-337. IEEE Computer Society, (2013)Adding static and dynamic semantics to building information models., , , , и . SEsCPS@ICSE, стр. 1-7. ACM, (2016)On the Interplay Between Cyber and Physical Spaces for Adaptive Security., , , и . IEEE Trans. Dependable Secur. Comput., 15 (3): 466-480 (2018)Requirements Engineering Meets Physiotherapy: An Experience with Motion-Based Games., , , , и . REFSQ, том 7830 из Lecture Notes in Computer Science, стр. 315-330. Springer, (2013)Software Engineering Challenges for Investigating Cyber-Physical Incidents., , и . SEsCPS@ICSE, стр. 34-40. IEEE, (2017)User-centric adaptation of multi-tenant services: preference-based analysis for service reconfiguration., , , и . SEAMS, стр. 65-74. ACM, (2014)