Author of the publication

A Conceptual Graph Model for W3C Resource Description Framework.

, , and . ICCS, volume 1867 of Lecture Notes in Computer Science, page 468-482. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust Me, I'm a Liar.. IEEE Secur. Priv., 20 (6): 79-82 (2022)Big Data Assurance: An Approach Based on Service-Level Agreements., , , , , and . Big Data, 11 (3): 239-254 (June 2023)Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists., , , , and . Comput. Electr. Eng., (2021)A Model-Driven Methodology for Big Data Analytics-as-a-Service., , , , , and . BigData Congress, page 105-112. IEEE Computer Society, (2017)Model-Based Big Data Analytics-as-a-Service: Take Big Data to the Next Level., , , , , and . IEEE Trans. Serv. Comput., 14 (2): 516-529 (2021)A Conceptual Graph Model for W3C Resource Description Framework., , and . ICCS, volume 1867 of Lecture Notes in Computer Science, page 468-482. Springer, (2000)An Approach to Generate Realistic HTTP Parameters for Application Layer Deception., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 337-355. Springer, (2022)Secure blockchain in the enterprise: A methodology., and . Pervasive Mob. Comput., (2019)Simulating Deception for Web Applications Using Reinforcement Learning., , , and . ESORICS Workshops (2), volume 14399 of Lecture Notes in Computer Science, page 719-737. Springer, (2023)An Attack Pattern Framework for Monitoring Enterprise Information Systems., , and . WETICE, page 173-178. IEEE Computer Society, (2016)