Author of the publication

Application of SOA in Safety-Critical Embedded Systems.

, , , , , , , and . ICHIT (2), volume 206 of Communications in Computer and Information Science, page 345-354. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating the Feasibility Issues of Data Confidentiality Solutions from a Data Warehousing Perspective., , and . DaWaK, volume 7448 of Lecture Notes in Computer Science, page 404-416. Springer, (2012)An Experimental Study of Software Aging and Rejuvenation in Dockerd., and . EDCC, page 1-6. IEEE, (2019)Benchmarking Untrustworthiness: An Alternative to Security Measurement., and . Int. J. Dependable Trust. Inf. Syst., 1 (2): 32-54 (2010)NoSQL Databases: A Software Engineering Perspective., , , , and . WorldCIST (1), volume 353 of Advances in Intelligent Systems and Computing, page 741-750. Springer, (2015)Detecting Malicious SQL., , and . TrustBus, volume 4657 of Lecture Notes in Computer Science, page 259-268. Springer, (2007)EDCC 2012 - Fast Abstracts & Student Forum Proceedings, and . CoRR, (2012)Penetration Testing for Web Services., and . Computer, 47 (2): 30-36 (2014)Editorial: Security and Dependability of Cloud Systems and Services - Part II., and . IEEE Trans. Serv. Comput., 10 (6): 927-928 (2017)A Europe-Brazil Context for Secure Data Analytics in the Cloud., , , , , , and . IEEE Secur. Priv., 16 (6): 52-60 (2018)Availability and reliability modeling of VM migration as rejuvenation on a system under varying workload., , and . Softw. Qual. J., 28 (1): 59-83 (2020)