Author of the publication

Finding Non-compliances with Declarative Process Constraints Through Semantic Technologies.

, , , , and . CAiSE Forum, volume 350 of Lecture Notes in Business Information Processing, page 60-74. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formalizing information security knowledge., and . AsiaCCS, page 183-194. ACM, (2009)Securing the testing process for industrial automation software., , , and . Comput. Secur., (2019)Securing Cyber-Physical Systems through Digital Twins., and . ERCIM News, (2018)Digital Twins for Cyber-Physical Threat Detection and Response., , and . ERCIM News, 2021 (126): 0 (2021)Anonymisation of Heterogeneous Graphs with Multiple Edge Types., , and . DEXA (1), volume 13426 of Lecture Notes in Computer Science, page 130-135. Springer, (2022)Ontological Mapping of Common Criteria's Security Assurance Requirements., , , and . SEC, volume 232 of IFIP, page 85-95. Springer, (2007)An Efficient Approach for Anonymising the Structure of Heterogeneous Graphs., , and . IEEE Big Data, page 5783-5791. IEEE, (2022)An evaluation of technologies for the pseudonymization of medical data., and . SAC, page 857-858. ACM, (2009)Interactive Selection of ISO 27001 Controls under Multiple Objectives., , and . SEC, volume 278 of IFIP, page 477-492. Springer, (2008)Cross-Platform File System Activity Monitoring and Forensics - A Semantic Approach., , , and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 384-397. Springer, (2020)