Author of the publication

Malicious changeload for the resilience evaluation of self-adaptive authorisation infrastructures.

, and . Future Gener. Comput. Syst., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Assessment of Shared Local Memory Buffering for Enhanced Multimedia Server Scalability., and . IMSA, page 131-135. IASTED/ACTA Press, (1999)Self-adaptive federated authorization infrastructures., , and . J. Comput. Syst. Sci., 80 (5): 935-952 (2014)Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models., , and . DASC, page 37-44. IEEE Computer Society, (2011)APSIS4all: personalisation as a strategy to ensure accessibility and enhance user experience of public digital terminals., and . W4A, page 31:1-31:2. ACM, (2014)Neural discrimination of nonprototypical chords in music experts and laymen: an MEG study, , , , , , , and . Journal of cognitive neuroscience, 21 (11): 2230--44 (November 2009)Measuring and comparing the reliability of the structured walkthrough evaluation method with novices and experts., , and . W4A, page 11:1-11:10. ACM, (2014)An educational tool to support the accessibility evaluation process., and . W4A, page 12. ACM, (2010)Investigation of a Superscalar Operand Stack Using FO4 and ASIC Wire-Delay Metrics., and . VLSI Design, (2014)A Database System For Organising Musique Concrete.. ICMC, Michigan Publishing, (2010)A lossless data reduction technique for wireless EEG recorders and its use in selective data filtering for seizure monitoring., and . EMBC, page 6186-6189. IEEE, (2015)