Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Management Services for Remote/Virtual Laboratories., , , , , and . Int. J. Online Eng., 10 (6): 43-49 (2014)Analyzing the Users' Acceptance of an IoT Cloud Platform Using the UTAUT/TAM Model., , , , and . IEEE Access, (2021)Analyzing the Students' Learning within a Container-based Virtual Laboratory for Cybersecurity., , , , , and . TEEM, page 275-283. ACM, (2019)Enhancing the expressivity of PADL for specifying Web Services Architectures., , , , and . TAMoCo, volume 169 of Frontiers in Artificial Intelligence and Applications, page 99-110. IOS Press, (2008)Dataset Generation and Study of Deepfake Techniques., , , and . UCAmI (2), volume 842 of Lecture Notes in Networks and Systems, page 197-206. Springer, (2023)Integration of management services for remote/virtual laboratories., , , , , , , , , and . EDUCON, page 605-610. IEEE, (2014)Formal Verification of the Secure Sockets Layer Protocol., , , and . ICEIS (3-2), page 246-252. (2008)978-989-8111-38-8.User Acceptance of a Proposed Self-Evaluation and Continuous Assessment System., , , , , and . J. Educ. Technol. Soc., 18 (2): 97-109 (2015)WST: a tool supporting timed composite Web Services Model transformation., , , , and . Simul., 88 (3): 349-364 (2012)Application of Formal Methods to the Analysis of Web Services Security., , , and . EPEW/WS-FM, volume 3670 of Lecture Notes in Computer Science, page 215-229. Springer, (2005)