Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing Security Agents for the DOK Federated System.. DBSec, volume 113 of IFIP Conference Proceedings, page 35-59. Chapman & Hall, (1997)A Model Predictive Controller for Managing QoS Enforcements and Microarchitecture-Level Interferences in a Lambda Platform., , and . IEEE Trans. Parallel Distributed Syst., 29 (7): 1442-1455 (2018)Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions., , , , and . IEEE Commun. Surv. Tutorials, 25 (3): 1775-1807 (2023)A least flow-time first load sharing approach for distributed server farm., , , and . J. Parallel Distributed Comput., 65 (7): 832-842 (2005)Efficient threshold password-authenticated secret sharing protocols for cloud computing., , , , , , , , and . J. Parallel Distributed Comput., (2019)Guest Editors' Introduction: Special Section on Semantic Issues of Multimedia Systems., and . IEEE Trans. Knowl. Data Eng., 13 (3): 335-336 (2001)An analytical study of cache invalidation algorithms in mobile environments., , and . Int. J. Pervasive Comput. Commun., 2 (1): 3-14 (2006)Assessing the Severity of Smart Attacks in Industrial Cyber-Physical Systems., , , and . ACM Trans. Cyber Phys. Syst., 5 (1): 10:1-10:28 (2021)A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids., , , and . ACM Comput. Surv., 55 (14s): 331:1-331:37 (2023)A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis., , , , , , , and . IEEE Trans. Emerg. Top. Comput., 2 (3): 267-279 (2014)