Author of the publication

What are Information Security Ontologies Useful for?

, , , and . MTSR, volume 544 of Communications in Computer and Information Science, page 51-61. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A systematic literature review on Wikidata, , and . Data Technol. Appl., (2019)Empirical findings on ontology metrics., , , and . Expert Syst. Appl., 39 (8): 6706-6711 (2012)Personalización estructural basada en criterios de usabilidad., , and . Inteligencia Artif., 6 (16): 99-106 (2002)An inquiry-based method for Choquet integral-based aggregation of interface usability parameters., , and . Kybernetika, 39 (5): 601-614 (2003)Automating educational processes implementation by means of an ontological framework., , , and . Comput. Stand. Interfaces, 36 (2): 335-348 (2014)Targeting Learning Resources In Competency-Based Organizations., , , , , and . The Semantic Web: Real-World Applications from Industry, volume 6 of Semantic Web and Beyond: Computing for Human Experience, Springer, (2007)On fuzziness in relationship value segmentation: applications to personalized e-commerce., and . SIGecom Exch., 4 (2): 1-10 (2003)Semantic Integration of Sensor Data and Disaster Management Systems: The Emergency Archetype Approach., , and . Int. J. Distributed Sens. Networks, (2013)Complete metadata records in learning object repositories: some evidence and requirements., , , , and . Int. J. Learn. Technol., 1 (4): 411-424 (2005)On Linking Cultural Spaces and e-Tourism: An Ontology-Based Approach., and . WSKS (2), volume 19 of Communications in Computer and Information Science, page 694-701. Springer, (2008)