Author of the publication

Towards a Quantum World in Cybersecurity Land.

, , , , , and . IS-EUD Workshops, volume 3408 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving expected tail loss estimates with neural networks., , and . Intell. Syst. Account. Finance Manag., 13 (2): 81-94 (2005)Onto-CARMEN: Ontology-driven approach for Cyber-Physical System Security Requirements meta-modelling and reasoning., , , , and . Internet Things, (December 2023)An MDA approach for developing secure OLAP applications: Metamodels and transformations., , , and . Comput. Sci. Inf. Syst., 12 (2): 541-565 (2015)Infinite Continuous Feature Model for Psychiatric Comorbidity Analysis., , , , and . Neural Comput., 28 (2): 354-381 (2016)Hacia la Implementación Automática de Almacenes de Datos Seguros en Herramientas OLAP., , , , and . JISBD, page 205-216. (2008)Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach., , , , and . OTM Conferences (2), volume 5332 of Lecture Notes in Computer Science, page 1052-1068. Springer, (2008)An ontology-based secure design framework for graph-based databases., , , , , and . Comput. Stand. Interfaces, (March 2024)Mortadelo: A Model-Driven Framework for NoSQL Database Design., , , , and . MEDI, volume 11163 of Lecture Notes in Computer Science, page 41-57. Springer, (2018)How the Conceptual Modelling Improves the Security on Document Databases., , , , , and . ER, volume 11157 of Lecture Notes in Computer Science, page 497-504. Springer, (2018)Obtaining Secure Code in SQL Server Analysis Services by using MDA and QVT., , , , and . WOSIS, page 38-48. INSTICC Press, (2008)