Author of the publication

Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes.

, , , and . IEEE Syst. J., 11 (2): 522-533 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallelizing XML data-streaming workflows via MapReduce., , , and . J. Comput. Syst. Sci., 76 (6): 447-463 (2010)Self-stabilizing local k-placement of replicas with local minimum variance., and . Theor. Comput. Sci., (2015)Efficiently Computing Provenance Graphs for Queries with Negation., , , and . CoRR, (2017)Improved Motif Detection in Large Sequence Sets with Random Sampling in a Kepler workflow., , , and . ICCS, volume 9 of Procedia Computer Science, page 1999. Elsevier, (2012)Implementing Unified Why- and Why-Not Provenance Through Games., , , and . IPAW, volume 9672 of Lecture Notes in Computer Science, page 209-213. Springer, (2016)Parallelizing XML Data-Streaming Workflows via Map-Reduce, , , and . Journal of Computer and System Sciences, (2009)Computing Location-Based Lineage from Workflow Specifications to Optimize Provenance Queries., , , and . IPAW, volume 8628 of Lecture Notes in Computer Science, page 180-193. Springer, (2014)Space-Efficient Fault-Containment in Dynamic Networks., and . SSS, volume 6976 of Lecture Notes in Computer Science, page 311-325. Springer, (2011)Scientific Workflows and Provenance: Introduction and Research Opportunities., , , , and . Datenbank-Spektrum, 12 (3): 193-203 (2012)Recognizing HPC Workloads Based on Power Draw Signatures., , , , , , and . CANDAR (Workshops), page 278-284. IEEE, (2021)