From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

BIGOWL4DQ: Ontology-driven approach for Big Data quality meta-modelling, selection and reasoning., , , , , и . Inf. Softw. Technol., (марта 2024)A Framework to Secure the Development and Auditing of SSL Pinning in Mobile Applications: The Case of Android Devices., , , , и . Entropy, 21 (12): 1136 (2019)ELI: an IoT-aware big data pipeline with data curation and data quality., , , , и . PeerJ Comput. Sci., (2023)FABIOLA: Defining the Components for Constraint Optimization Problems in Big Data Environment., , , и . ISD, Association for Information Systems, (2017)Reasoning on the usage control security policies over data artifact business process models., , , , и . Comput. Sci. Inf. Syst., 19 (2): 547-572 (2022)Enabling Process Mining in Airbus Manufacturing., , , , и . Business Process Management Cases (2), Springer, (2021)Advisory: vulnerability analysis in software development project dependencies., , , , и . SPLC (B), стр. 99-102. ACM, (2022)CHAMALEON: Framework to improve Data Wrangling with Complex Data., , , и . ICIS, Association for Information Systems, (2019)Definition and Verification of Security Configurations of Cyber-Physical Systems., , , , , и . CyberICPS/SECPRE/ADIoT@ESORICS, том 12501 из Lecture Notes in Computer Science, стр. 135-155. Springer, (2020)AMADEUS: towards the AutoMAteD secUrity teSting., , , и . SPLC (A), стр. 11:1-11:12. ACM, (2020)