Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing the Users' Acceptance of an IoT Cloud Platform Using the UTAUT/TAM Model., , , , and . IEEE Access, (2021)Automatic Management Services for Remote/Virtual Laboratories., , , , , and . Int. J. Online Eng., 10 (6): 43-49 (2014)Integration of management services for remote/virtual laboratories., , , , , , , , , and . EDUCON, page 605-610. IEEE, (2014)Analyzing the Students' Learning within a Container-based Virtual Laboratory for Cybersecurity., , , , , and . TEEM, page 275-283. ACM, (2019)Enhancing the expressivity of PADL for specifying Web Services Architectures., , , , and . TAMoCo, volume 169 of Frontiers in Artificial Intelligence and Applications, page 99-110. IOS Press, (2008)Dataset Generation and Study of Deepfake Techniques., , , and . UCAmI (2), volume 842 of Lecture Notes in Networks and Systems, page 197-206. Springer, (2023)Assessment and recognition in technical massive open on-line courses with and without on-line laboratories., , , , , , , , , and 5 other author(s). EDUCON, page 1-4. IEEE, (2023)WST: a tool supporting timed composite Web Services Model transformation., , , , and . Simul., 88 (3): 349-364 (2012)Application of Formal Methods to the Analysis of Web Services Security., , , and . EPEW/WS-FM, volume 3670 of Lecture Notes in Computer Science, page 215-229. Springer, (2005)Formal Verification of the Secure Sockets Layer Protocol., , , and . ICEIS (3-2), page 246-252. (2008)978-989-8111-38-8.