Author of the publication

Black-box approach for testing quality of service in case of security incidents on the example of a SIP-based VoIP service: work in progress.

, , , and . IPTComm, page 101-110. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Descriptor Theory - What is about?., , and . ICCI, page 418-422. IEEE Computer Society, (1993)Applying Continuous Code Reviews in Airport Operations Software., , , and . QSIC, page 214-219. IEEE, (2012)Outsourcing as a strategy for IT harmonization: a public sector case study proposing an approach in independent stakeholder scenarios., , and . ICEGOV, volume 351 of ACM International Conference Proceeding Series, page 245-250. ACM, (2008)Automated Code Transformations: Dealing with the Aftermath., , , , and . SANER, page 627-631. IEEE, (2020)Securing the Rights of Data Subjects with Blockchain Technology., , , , , and . ICICT, page 284-288. IEEE, (2020)Hyper Typer: A Serious Game for Measuring Mobile Text Entry Performance in the Wild., , and . CHI Extended Abstracts, ACM, (2019)Introducing a Software Reuse Culture in Practice., and . CSEE, volume 750 of Lecture Notes in Computer Science, page 527-539. Springer, (1994)GroFin: enhancing in-store grocery shopping with a context-aware smartphone app., , , and . MUM, page 29:1-29:11. ACM, (2019)Ten Heuristics from Applying Agile Practices across Different Distribution Scenarios: A Multiple-Case Study., and . Computer and Information Science, 9 (2): 68-81 (2016)Design space for focus+context navigation in web forms., , , and . EICS, page 39-44. ACM, (2014)