Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risks of Sharing Cyber Incident Information., , and . ARES, page 58:1-58:10. ACM, (2018)A Fault-Tolerant Architectural Approach for Dependable Systems., , and . IEEE Software, 23 (2): 80-87 (2006)Analysing failure behaviours in component interaction.. J. Syst. Softw., 71 (1-2): 97-115 (2004)Incorporating architecture-based self-adaptation into an adaptive industrial software system., , , , , , and . J. Syst. Softw., (2016)Self-adaptive authorisation in OpenStack cloud platform., , , and . J. Internet Serv. Appl., 9 (1): 19:1-19:17 (2018)Human in the loop: what is the point of no return?. SEAMS@ICSE, page 165-166. ACM, (2020)Software engineering for large-scale multi-agent systems - SELMAS 2004: workshop report., , , , , , , , , and . ACM SIGSOFT Softw. Eng. Notes, 29 (5): 1-10 (2004)Malicious changeload for the resilience evaluation of self-adaptive authorisation infrastructures., and . Future Gener. Comput. Syst., (2020)An Adaptive Classification Framework for Unsupervised Model Updating in Nonstationary Environments., , , , and . MOD, volume 9432 of Lecture Notes in Computer Science, page 171-184. Springer, (2015)Workshop on Safety: Computer Systems in Critical Applications., and . LADC, volume 2847 of Lecture Notes in Computer Science, page 362. Springer, (2003)