Author of the publication

Runtime Anomaly Detection Method in Smart Factories using Machine Learning on RDF Event Streams: Grand Challenge.

, , , and . DEBS, page 304-309. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward More Reliable Intelligent Environments.. Intelligent Environments (Workshops), volume 22 of Ambient Intelligence and Smart Environments, page 5-7. IOS Press, (2017)Future robotic computer: a new type of computing device with robotic functions., , , , , , and . HRI, page 261-262. ACM, (2011)An Integrated Formal Model for Context-Aware Systems., , , , and . COMPSAC Workshops, page 163-168. IEEE Computer Society, (2013)Interface/implementation Separation Mechanism for Integrating Object-oriented Management Systems and General-purpose Programming Languages., and . Comput. J., 43 (6): 512-523 (2000)Buffer Management for Identifying Crypto-Ransomware Attack in Environment with No Semantic Information., , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 443-450. IEEE, (2019)Support for the safety of EVM bytecode via function-call interceptor., and . QRS Companion, page 676-684. IEEE, (2021)Stone: A Privacy Policy Enforcement System for Smart Contracts., , , and . SANER, page 1203-1206. IEEE, (2022)Preventing Illegal Usage of Mobile Phone Software., and . COMPSAC (2), page 25-26. IEEE Computer Society, (2005)0-7695-2413-3.A Lingustic Approach for Robustness in Context Aware Applications., , and . UIC/ATC, page 24-31. IEEE Computer Society, (2012)Data Protection Based on Hidden Space in Windows Against Ransomware., , , , and . ICICT (1), volume 235 of Lecture Notes in Networks and Systems, page 629-637. Springer, (2021)