Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion Detection Using Emergent Self-organizing Maps., and . SETN, volume 3955 of Lecture Notes in Computer Science, page 559-562. Springer, (2006)A case study of a laboratory experimental process in Vocational Education Training (VET)., , and . SEEDA-CECNSM, page 1-8. IEEE, (2018)Collision-Free Advertisement Scheduling for IEEE 802.15.4-TSCH Networks., , and . Sensors, 19 (8): 1789 (2019)An Identity and Access Management approach for SOA., , and . ISSPIT, page 126-131. IEEE, (2016)Bridging theory and practice in e-government: A set of guidelines for architectural design., and . Gov. Inf. Q., 27 (1): 70-81 (2010)A prototype workflow MIS for supply chain management: architecture, implementation and business evaluation., , , and . Int. J. Bus. Inf. Syst., 41 (1): 43-68 (2022)Towards more sustainable higher education institutions: Implementing the sustainable development goals and embedding sustainability into the information and computer technology curricula., , , and . Educ. Inf. Technol., 29 (4): 5079-5113 (March 2024)ESTA: Educating Adolescents in Sustainable Travel Urban Behavior through Mobile Applications Using Motivational Features., , and . Comput., 9 (2): 15 (2021)Detecting Sophisticated Attacks in Maritime Environments using Hybrid Situational Awareness., , , and . ICT-DM, page 1-7. IEEE, (2019)Guest Editorial: 26th IEEE symposium on computers and communications (ISCC 2021) selected papers., , , , and . Comput. Networks, (2022)