Author of the publication

An Analysis of Using State of the Art Technologies to Implement Real-Time Continuous Assurance.

, , and . SERVICES, page 415-422. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FN-Net: A lightweight CNN-based architecture for fabric defect detection with adaptive threshold-based class determination., , , , , and . Displays, (2022)Rice Semantic Segmentation Using Unet-VGG16: A Case Study in Yunlin, Taiwan., , , and . ISPACS, page 1-2. IEEE, (2021)A constant queue partial permutation routing algorithm for cube-connected-cycles multicomputer systems., , , and . ICPADS Workshops, page 35-40. IEEE Computer Society, (2000)Resolving automatic high availability operations and users commands to virtual machines on OpenStack., , , and . ICS, page 159-164. IEEE, (2020)Winckp: A Transparent Checkpointing and Rollback Recovery Tool for Windows NT Applications., , , , and . FTCS, page 220-223. IEEE Computer Society, (1999)A New Non-intrusive Authentication Approach for Data Protection Based on Mouse Dynamics., , and . ISBAST, page 9-14. IEEE Computer Society, (2012)A Nested Invocation Suppression Mechanism for Cctive Replicated SOAP Systems., , and . APSEC, page 392-399. IEEE Computer Society, (2004)Financial ratio selection for business crisis prediction., , and . Expert Syst. Appl., 38 (12): 15094-15102 (2011)Analyzing Tradeoffs between Temporary Consistency and Concurrency with Rollbacks and Aborts., and . ICPP (2), page 234-241. CRC Press, (1992)An Approach for Authenticating Smartphone Users Based on Histogram Features., , and . QRS, page 125-130. IEEE, (2015)