Author of the publication

Sharing Cyber Threat Intelligence Under the General Data Protection Regulation.

, , and . APF, volume 11498 of Lecture Notes in Computer Science, page 28-41. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dependable and Secure Distributed Storage System for Ad Hoc Networks., , , , and . ADHOC-NOW, volume 4686 of Lecture Notes in Computer Science, page 142-152. Springer, (2007)A methodology for the requirements analysis of critical real-time systems.. Newcastle University, Newcastle upon Tyne, UK, (1994)British Library, EThOS.Robustness evaluation of the rainbow framework for self-adaptation., , , , and . SAC, page 376-383. ACM, (2014)Empirical resilience evaluation of an architecture-based self-adaptive software system., , , and . QoSA, page 63-72. ACM, (2014)Dependable Computing., and . J. Braz. Comput. Soc., 10 (3): 3-4 (2005)Software engineering for large-scale multi-agent systems: SELMAS 2003: workshop report., , , , , , , , , and . ACM SIGSOFT Softw. Eng. Notes, 28 (6): 1 (2003)Micro-controllers: Promoting Structurally Flexible Controllers in Self-Adaptive Software Systems., , , and . CoRR, (2020)Testing of adaptive and context-aware systems: approaches and challenges., , , , and . Softw. Test. Verification Reliab., (2021)The Conflict Between Self-* Capabilities and Predictability.. Self-star Properties in Complex Information Systems, volume 3460 of Lecture Notes in Computer Science, page 219-228. Springer, (2005)Development of Fault-Tolerant Software Systems Based on Architectural Abstractions., , and . ECSA, volume 5292 of Lecture Notes in Computer Science, page 131-147. Springer, (2008)