Author of the publication

Achieving Service Accountability Through Blockchain and Digital Identity.

, , , , and . CAiSE Forum, volume 317 of Lecture Notes in Business Information Processing, page 16-23. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PCkAD: an unsupervised intrusion detection technique exploiting within payload n-gram location distribution., , and . CoRR, (2014)Exploiting Content Spatial Distribution to Improve Detection of Intrusions., , and . ACM Trans. Internet Techn., 18 (2): 25:1-25:21 (2018)Adaptive Ladder Queue: Achieving O(1) Amortized Access Time in Practice., and . SIGSIM-PADS, page 101-104. ACM, (2018)A Cloud-based platform for the emulation of complex cybersecurity scenarios., , , , and . Future Gener. Comput. Syst., (2018)Performance of a multi-agent system over a multi-core cluster managed by Terracotta., , , and . SpringSim (TMS-DEVS), page 125-133. SCS/ACM, (2011)Modelling and simulation of complex manufacturing systems using statechart-based actors., , and . Simul. Model. Pract. Theory, 19 (2): 685-703 (2011)A development methodology for embedded systems based on RT-DEVS., and . Innov. Syst. Softw. Eng., 5 (2): 117-127 (2009)Model checking time-dependent system specifications using Time Stream Petri Nets and Uppaal., , and . Appl. Math. Comput., 218 (16): 8160-8186 (2012)Modelling and Simulation of a Defense Strategy to Face Indirect DDoS Flooding Attacks., , , and . IDCS, volume 8729 of Lecture Notes in Computer Science, page 263-274. Springer, (2014)A Simulation Model for the Analysis of DDoS Amplification Attacks., , , and . UKSim, page 267-272. IEEE, (2015)