Author of the publication

A pervasive environment for systemising innovative services in knowledge-intensive firms.

, , and . Int. J. Electron. Bus., 9 (5/6): 429-453 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the integration of artifact lifecycles., , , and . MEDES, page 59-63. ACM, (2015)Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions., and . Sensors, 18 (12): 4215 (2018)Correction to "The Integration of Corporate Security Strategies in Collaborative Business Processes"., , and . IEEE Trans. Serv. Comput., 5 (1): 144 (2012)Towards Security Awareness in Designing Service-oriented Architectures., , , and . ICEIS (3), page 347-355. SciTePress, (2013)On the Testability of Artificial Intelligence and Machine Learning Systems., , , and . Computer, 55 (3): 101-105 (2022)Lung cancer survival period prediction and understanding: Deep learning approaches., , and . Int. J. Medical Informatics, (2021)Security and privacy in the Internet of Things: threats and challenges., , and . Serv. Oriented Comput. Appl., 15 (4): 257-271 (2021)Extracting Information From Coarser-grained Data in XML Documents.. J. Digit. Inf. Manag., 4 (2): 117-123 (2006)Resilient and Trustworthy Dynamic Data-driven Application Systems (DDDAS) Services for Crisis Management Environments., , , and . ICCS, volume 51 of Procedia Computer Science, page 2623-2637. Elsevier, (2015)E-profile-based security for critical transactions in web applications., , and . ICITST, page 1-2. IEEE, (2009)