Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Role of acquisition intervals in private and public cloud storage costs., , and . Decis. Support Syst., (2014)Evaluating Classifiers for Mobile-Masquerader Detection., , and . SEC, volume 201 of IFIP, page 271-283. Springer, (2006)Cost Efficiency of Hybrid Cloud Storage: Shortening Acquisition Cycle to Mitigate Volume Variation., , and . ICIS, Association for Information Systems, (2015)Hybrid Cloud Architecture for Short Message Services., , , , and . CLOSER, page 489-500. SciTePress, (2012)Analyzing Impact of Interface Implementation Efforts on the Structure of a Software Market - OSS/BSS Market Polarization Scenario., , and . ICSOFT (SE/MUSE/GSDCA), page 80-87. INSTICC Press, (2008)Information Security Culture: A Survey., and . INC, page 153-157. University of Plymouth, (2010)A framework for evaluating Internet-of-Things platforms: Application provider viewpoint., and . WF-IoT, page 147-152. IEEE Computer Society, (2014)Real-time recognition of personal routes using instance-based learning.. Intelligent Vehicles Symposium, page 619-624. IEEE, (2011)Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications., , and . Decis. Support Syst., (2014)Learning Temporal Regularities of User Behavior for Anomaly Detection., , and . MMM-ACNS, volume 2052 of Lecture Notes in Computer Science, page 143-152. Springer, (2001)