Author of the publication

A Planner for Supporting Countermeasures in Large Scale Cyber Attacks.

, and . CISIS, volume 611 of Advances in Intelligent Systems and Computing, page 964-973. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Semantics and Patterns for Verification of Orchestrated Cloud Services.. CISIS, page 192-199. IEEE Computer Society, (2015)Thermal-Aware Verification and Monitoring of Service Providers in MetaMORP(H)OSY., and . INCoS, page 551-556. IEEE, (2014)Improving Results of Forensics Analysis by Semantic-Based Suggestion System., , , , and . EIDWT, volume 17 of Lecture Notes on Data Engineering and Communications Technologies, page 956-967. Springer, (2018)Automatic Cloud Services Composition for Big Data Management., and . AINA Workshops, page 46-51. IEEE Computer Society, (2016)Enabling Model Driven Engineering of Cloud Services by using mOSAIC Ontology., , and . Scalable Computing: Practice and Experience, (2012)The software architecture of the OsMoSys multisolution framework., , , , , and . VALUETOOLS, page 51. ICST/ACM, (2007)OVerFA: a collaborative framework for the semantic annotation of documents and websites., , , and . IJWGS, 5 (1): 30-45 (2009)A Model Driven Approach to Water Resource Analysis based on Formal Methods and Model Transformation., , , , , and . ICCS, volume 51 of Procedia Computer Science, page 562-571. Elsevier, (2015)A model driven approach to data privacy verification in E-Health systems., and . Trans. Data Priv., 8 (3): 273-296 (2015)Solution Workflows for Model-Based Analysis of Complex Systems., , , , and . IEEE Trans Autom. Sci. Eng., 9 (1): 83-95 (2012)