From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Threat Modeling based Penetration Testing: The Open Energy Monitor Case study., , и . SIN, стр. 8:1-8:8. ACM, (2020)Automated Threat Modeling Approaches: Comparison of Open Source Tools., , и . QUATIC, том 1621 из Communications in Computer and Information Science, стр. 250-265. Springer, (2022)An SLA-Based Approach to Manage Sensor Networks as-a-Service., , , , и . CloudCom (1), стр. 191-197. IEEE Computer Society, (2013)Methodology to Obtain the Security Controls in Multi-cloud Applications., , , , , и . CLOSER (1), стр. 327-332. SciTePress, (2016)Design and Development of a Technique for the Automation of the Risk Analysis Process in IT Security., и . CLOSER, стр. 87-98. SCITEPRESS, (2021)Negotiation Policies for Provisioning of Cloud Resources., , , , , и . ICAART (2), стр. 347-350. SciTePress, (2012)Intrusion Tolerance of Stealth DoS Attacks to Web Services., и . SEC, том 376 из IFIP Advances in Information and Communication Technology, стр. 579-584. Springer, (2012)On the Adoption of Security SLAs in the Cloud., , и . A4Cloud, том 8937 из Lecture Notes in Computer Science, стр. 45-62. Springer, (2014)Identity federation in cloud computing., , и . IAS, стр. 253-259. IEEE, (2010)An SLA-based brokering platform to provide sensor networks as-a-service., , , , и . Int. J. Bus. Process. Integr. Manag., 7 (2): 114-127 (2014)