Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rule-based generation of requirements traceability relations, , , and . Journal of Systems and Software, 72 (2): 105--127 (July 2004)Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments., , , , , , and . CAMAD, page 1-6. IEEE, (2019)A Pattern-Based Approach for Designing Reliable Cyber-Physical Systems., , , , and . GLOBECOM, page 1-6. IEEE, (2015)Patterns for the design of secure and dependable software defined networks., , and . Comput. Networks, (2016)MBotCS: A Mobile Botnet Detection System Based on Machine Learning., and . CRiSIS, volume 9572 of Lecture Notes in Computer Science, page 274-291. Springer, (2015)A Privacy-Level Model of User-Centric Cyber-Physical Systems., , , and . HCI (27), volume 8030 of Lecture Notes in Computer Science, page 338-347. Springer, (2013)Cyber Range Training Programme Specification Through Cyber Threat and Training Preparation Models., , , and . MSTEC, volume 12512 of Lecture Notes in Computer Science, page 22-37. Springer, (2020)Towards a unification of treatments and interventions for tinnitus patients: The EU research and innovation action UNITI, , , , , , , , , and 70 other author(s). 260, page 441-451. Elsevier, (2021)Secure Semantic Interoperability for IoT Applications with Linked Data., , , , , , , , , and . GLOBECOM, page 1-6. IEEE, (2019)Overlaps in Requirements Engineering., , and . Autom. Softw. Eng., 6 (2): 171-198 (1999)