Author of the publication

A Methodology to Evaluate Agent Oriented Software Engineering Techniques.

, , , , and . HICSS, page 60. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation., and . SSCI, page 455-462. IEEE, (2015)A Computing Environment to Support Repeatable Scientific Big Data Experimentation of World-Wide Scientific Literature., , , and . ISSI, Bogaziçi University Printhouse, (2015)Microgrid Disaster Resiliency Analysis: Reducing Costs in Continuity of Operations (COOP) Planning., , , and . HICSS, page 1-10. ScholarSpace, (2019)Introduction to Supply Chain Security and Mutual Trust Research Minitrack., , and . HICSS, page 1-2. ScholarSpace / AIS Electronic Library (AISeL), (2017)Secure VM for monitoring industrial process controllers., , , , , and . CSIIRW, page 39. ACM, (2011)Addressing the need for independence in the CSE model., , , and . CICS, page 68-75. IEEE, (2011)IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses., , , and . Sensors, 21 (19): 6432 (2021)Conceptual framework to enable early warning of relevant phenomena "Emerging phenomena and big data"., , and . ISI, page 227-229. IEEE, (2013)Security management of cyber physical control systems using NIST SP 800-82r2., , , , and . IWCMC, page 1864-1870. IEEE, (2017)Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure., , , and . CSIIRW, page 48. ACM, (2013)