Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predictive Simulation within the Process of Building Trust., , and . ICSA Companion, page 47-48. IEEE, (2022)Comparison of Safety and Security Analysis Techniques., , and . CISIS-ICEUTE, volume 1400 of Advances in Intelligent Systems and Computing, page 234-242. Springer, (2021)Creating Trust in Collaborative Embedded Systems., , , and . Model-Based Engineering of Collaborative Embedded Systems, Springer, (2021)Deep-Learning based Trust Management with Self-Adaptation in the Internet of Behavior., , , and . SAC, page 874-881. ACM, (2023)Towards Runtime Monitoring for Malicious Behaviors Detection in Smart Ecosystems., , , , , , and . ISSRE Workshops, page 200-203. IEEE, (2019)Development and Evaluation of Collaborative Embedded Systems using Simulation., , , , , , and . Model-Based Engineering of Collaborative Embedded Systems, Springer, (2021)Predictive Simulation for Building Trust Within Service-Based Ecosystems., , and . PerCom Workshops, page 34-37. IEEE, (2022)Towards creation of a reference architecture for trust-based digital ecosystems., , , , and . ECSA (Companion), page 273-276. ACM, (2019)(Do not) trust in ecosystems., , and . ICSE (NIER), page 9-12. IEEE / ACM, (2019)Building trust in the untrustable., , , and . ICSE-SEIS, page 21-24. ACM, (2020)