Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enterprise Data Quality: A Pragmatic Approach., , , , and . Inf. Syst. Frontiers, 1 (3): 279-301 (1999)Multidatabase Interdependencies in Industry., and . SIGMOD Conference, page 483-486. ACM Press, (1993)Zero-Day Attack Identification in Streaming Data Using Semantics and Spark., , , , and . BigData Congress, page 121-128. IEEE Computer Society, (2017)Using Context in Semantic Data Integration. IBIS - International Journal of Interoperability in Business Information Systems, 1 (3): 9-22 (December 2006)Searching for relevant software change artifacts using semantic networks., , , , and . SAC, page 496-500. ACM, (2009)Measuring Software Security Using Improved CWE Base Score., , and . CIKM Workshops, volume 3052 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)Beyond data: contextual information fusion for cyber security analytics., and . SAC, page 73-79. ACM, (2016)Semantic integration of government data for water quality management., , , , and . Gov. Inf. Q., 24 (4): 716-735 (2007)Context aware discovery in web data through anomaly detection., , and . Int. J. Web Eng. Technol., 10 (1): 3-30 (2015)On the Verification of Software Vulnerabilities During Static Code Analysis Using Data Mining Techniques - (Short Paper)., and . OTM Conferences (2), volume 10574 of Lecture Notes in Computer Science, page 99-106. Springer, (2017)