Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Engineering of SOA Applications Via Reliability Patterns., , and . J. Softw. Eng. Appl., 4 (1): 1-8 (2011)Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study., , , and . Technol. Anal. Strateg. Manag., 33 (8): 900-913 (2021)A hidden Markov model based intrusion detection system for wireless sensor networks., , , and . Int. J. Crit. Comput. Based Syst., 3 (3): 210-228 (2012)Detection of Radio Frequency Interference in Satellite Ground Segments., , , , , , and . CSR, page 648-653. IEEE, (2023)QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud., , , and . SITIS, page 527-532. IEEE Computer Society, (2012)Distributed Framework for Cybersecurity of Critical Infrastructures, , , and . Effective Surveillance for Homeland Security: Balancing Technology and Social Issues, (2013)An event correlation approach for fault diagnosis in SCADA infrastructures., , , , and . EWDC, page 15-20. ACM, (2011)A DBSCAN based approach for jointly segment and classify brain MR images., , , , and . EMBC, page 2993-2996. IEEE, (2015)QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach., , , , and . Euro-Par Workshops (1), volume 7155 of Lecture Notes in Computer Science, page 15-24. Springer, (2011)Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks., , , , , , and . SAFECOMP, volume 8666 of Lecture Notes in Computer Science, page 214-229. Springer, (2014)