Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Situation-based and self-adaptive applications for the smart environment., , , , and . J. Ambient Intell. Smart Environ., 4 (6): 491-516 (2012)A Demo on Using Visualization to Aid Run-Time Verification of Dynamic Service Systems.. ICST Workshops, page 319-324. IEEE Computer Society, (2010)Piecemeal Development of Intelligent Applications for Smart Spaces., and . IEEE Access, (2014)Privacy-friendly Discovery of Common Friends in P2P Networks., , , and . FRUCT, page 181-188. IEEE, (2022)Developing Reusable Knowledge Processors for Smart Environments., and . SAINT, page 286-291. IEEE Computer Society, (2011)Visualizing structure and quality properties of Smart Spaces., , and . ISCC, page 1-3. IEEE Computer Society, (2010)Mitigating IoT security threats with a trusted Network element., , , and . ICITST, page 260-265. IEEE, (2016)Supporting Situation-Awareness in Smart Spaces., , and . GPC Workshops, volume 7096 of Lecture Notes in Computer Science, page 14-23. Springer, (2011)Combining real-time risk visualization and anomaly detection., , , and . ECSA (Companion), page 55:1-55:7. ACM, (2018)Building a Virtual Maritime Logistics Cybersecurity Training Platform, , , , and . (Sep 1, 2020)