Author of the publication

Security aspects in Semantic Web Services Filtering.

, , , , , , and . iiWAS, volume 229 of books@ocg.at, page 21-31. Austrian Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ontological Mapping of Common Criteria's Security Assurance Requirements., , , and . SEC, volume 232 of IFIP, page 85-95. Springer, (2007)Securing Cyber-Physical Systems through Digital Twins., and . ERCIM News, (2018)Securing the testing process for industrial automation software., , , and . Comput. Secur., (2019)Anonymisation of Heterogeneous Graphs with Multiple Edge Types., , and . DEXA (1), volume 13426 of Lecture Notes in Computer Science, page 130-135. Springer, (2022)Formalizing information security knowledge., and . AsiaCCS, page 183-194. ACM, (2009)An Efficient Approach for Anonymising the Structure of Heterogeneous Graphs., , and . IEEE Big Data, page 5783-5791. IEEE, (2022)Taming the logs - Vocabularies for semantic security analysis., , and . SEMANTiCS, volume 137 of Procedia Computer Science, page 109-119. Elsevier, (2018)Macro-level Inference in Collaborative Learning., and . CODASPY, page 373-375. ACM, (2022)Combining Machine Learning and Semantic Web: A Systematic Mapping Study., , , , , , , , , and 1 other author(s). NeSy, volume 3432 of CEUR Workshop Proceedings, page 424. CEUR-WS.org, (2023)The SLOGERT Framework for Automated Log Knowledge Graph Construction., , and . ESWC, volume 12731 of Lecture Notes in Computer Science, page 631-646. Springer, (2021)