Author of the publication

The design of secure IoT applications using patterns: State of the art and directions for research.

, , , and . Internet Things, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defect Analysis and Prediction by Applying the Multistage Software Reliability Growth Model., , , , , , , and . IWESEP, page 7-11. IEEE Computer Society, (2017)Analyzing Effectiveness of Workshops for Learning Agile Development Principles., , , , , and . AGILE, page 50-59. IEEE Computer Society, (2013)Impact of Using a Static-Type System in Computer Programming., , and . HASE, page 116-119. IEEE Computer Society, (2017)Predicting Release Time Based on Generalized Software Reliability Model (GSRM)., , and . COMPSAC, page 604-605. IEEE Computer Society, (2014)Evaluating the degree of security of a system built using security patterns., , and . ARES, page 43:1-43:8. ACM, (2018)Improving the Classification of Security Patterns., , , , and . DEXA Workshops, page 165-170. IEEE Computer Society, (2009)A Machine Learning Based Approach to Detect Machine Learning Design Patterns., , , , , and . APSEC, page 574-578. IEEE, (2023)Identifying Misalignment of Goal and Strategies Across Organizational Units by Interpretive Structural Modeling., , , and . HICSS, page 4576-4585. IEEE Computer Society, (2016)Inappropriate Usage Examples in Web API Documentations., , , , , , , , , and 1 other author(s). ICSME, page 343-347. IEEE, (2019)1st International Workshop on Software Patterns and Quality (SPAQu'07)., and . APSEC, page 557-558. IEEE Computer Society, (2007)