Author of the publication

Malicious changeload for the resilience evaluation of self-adaptive authorisation infrastructures.

, and . Future Gener. Comput. Syst., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An architectural support for self-adaptive software for treating faults., and . WOSS, page 39-42. ACM, (2002)Architecture-Centric Fault Tolerance with Exception Handling., , , and . LADC, volume 4746 of Lecture Notes in Computer Science, page 75-94. Springer, (2007)Scaling Dependability and Security in Ad Hoc Networks.. LADC, volume 4746 of Lecture Notes in Computer Science, page 237. Springer, (2007)Architectural Fault Tolerance Using Exception Handling.. WADS, volume 4615 of Lecture Notes in Computer Science, page 142-162. Springer, (2006)Robustness Evaluation of Controllers in Self-Adaptive Software Systems., , , , and . LADC, page 1-10. IEEE Computer Society, (2013)Self-adaptive federated authorization infrastructures., , and . J. Comput. Syst. Sci., 80 (5): 935-952 (2014)A cloud-edge based data security architecture for sharing and analysing cyber threat information., , , , , , , , , and . Future Gener. Comput. Syst., (2020)Robustness-Driven Resilience Evaluation of Self-Adaptive Software Systems., , , , and . IEEE Trans. Dependable Secur. Comput., 14 (1): 50-64 (2017)Sharing Cyber Threat Intelligence Under the General Data Protection Regulation., , and . APF, volume 11498 of Lecture Notes in Computer Science, page 28-41. Springer, (2019)Architecting Web Services Applications for Improving Availability.. WADS, volume 3549 of Lecture Notes in Computer Science, page 69-91. Springer, (2004)