Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Challenging Anomaly Detection in Complex Dynamic Systems., , and . SRDS, page 213-214. IEEE Computer Society, (2016)On the impact of emergent properties on SoS security., , , and . SoSE, page 1-6. IEEE, (2016)On Algorithms Selection for Unsupervised Anomaly Detection., , and . PRDC, page 279-288. IEEE, (2018)Towards a Framework for Self-Adaptive Reliable Network Services in Highly-Uncertain Environments., , , , and . ISORC Workshops, page 184-193. IEEE Computer Society, (2010)Meeting the challenges in the design and evaluation of a trackside real-time safety-critical system., , , and . ISORC, page 1-10. IEEE Computer Society, (2013)A Service Discovery Approach for Testing Dynamic SOAs., , and . ISORC Workshops, page 133-142. IEEE Computer Society, (2011)A Resilient SIL 2 Driver Machine Interface for Train Control Systems., , , , , and . DepCoS-RELCOMEX, page 365-374. IEEE Computer Society, (2008)A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events., , and . ARES, page 223-228. IEEE Computer Society, (2016)Evaluation of Anomaly Detection Algorithms Made Easy with RELOAD., , and . ISSRE, page 446-455. IEEE, (2019)Design, implementation, and assessment of a usable multi-biometric continuous authentication system., , , and . Int. J. Crit. Comput. Based Syst., 9 (3): 215-247 (2019)