Author of the publication

A Conceptual Graph Model for W3C Resource Description Framework.

, , and . ICCS, volume 1867 of Lecture Notes in Computer Science, page 468-482. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust Me, I'm a Liar.. IEEE Secur. Priv., 20 (6): 79-82 (2022)Secure blockchain in the enterprise: A methodology., and . Pervasive Mob. Comput., (2019)Model-Based Big Data Analytics-as-a-Service: Take Big Data to the Next Level., , , , , and . IEEE Trans. Serv. Comput., 14 (2): 516-529 (2021)A Conceptual Graph Model for W3C Resource Description Framework., , and . ICCS, volume 1867 of Lecture Notes in Computer Science, page 468-482. Springer, (2000)An Approach to Generate Realistic HTTP Parameters for Application Layer Deception., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 337-355. Springer, (2022)Simulating Deception for Web Applications Using Reinforcement Learning., , , and . ESORICS Workshops (2), volume 14399 of Lecture Notes in Computer Science, page 719-737. Springer, (2023)Measuring Developers' Web Security Awareness from Attack and Defense Perspectives., , , , , and . SP (Workshops), page 31-43. IEEE, (2022)Tool support for secure programming by security testing., , , , , , and . ICST Workshops, page 1-4. IEEE Computer Society, (2015)An Attack Pattern Framework for Monitoring Enterprise Information Systems., , and . WETICE, page 173-178. IEEE Computer Society, (2016)Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists., , , , and . Comput. Electr. Eng., (2021)