Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An architectural support for self-adaptive software for treating faults., and . WOSS, page 39-42. ACM, (2002)Architecture-Centric Fault Tolerance with Exception Handling., , , and . LADC, volume 4746 of Lecture Notes in Computer Science, page 75-94. Springer, (2007)Scaling Dependability and Security in Ad Hoc Networks.. LADC, volume 4746 of Lecture Notes in Computer Science, page 237. Springer, (2007)Self-adaptive federated authorization infrastructures., , and . J. Comput. Syst. Sci., 80 (5): 935-952 (2014)A cloud-edge based data security architecture for sharing and analysing cyber threat information., , , , , , , , , and . Future Gener. Comput. Syst., (2020)Sharing Cyber Threat Intelligence Under the General Data Protection Regulation., , and . APF, volume 11498 of Lecture Notes in Computer Science, page 28-41. Springer, (2019)Architecting Fault Tolerance with Exception Handling: Verification and Validation., , , and . J. Comput. Sci. Technol., 24 (2): 212-237 (2009)Architecting Web Services Applications for Improving Availability.. WADS, volume 3549 of Lecture Notes in Computer Science, page 69-91. Springer, (2004)Novel Approaches in Dependable Computing.. EDCC, volume 2485 of Lecture Notes in Computer Science, page 79-80. Springer, (2002)Software Self-adaptation and Industry: Blame MAPE-K.. SEAMS, page 88-89. IEEE, (2023)