Author of the publication

Temporal verification of RT-DEVS models with implementation aspects.

, , , and . SpringSim, page 130. SCS/ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A development methodology for embedded systems based on RT-DEVS., and . Innov. Syst. Softw. Eng., 5 (2): 117-127 (2009)A Cloud-based platform for the emulation of complex cybersecurity scenarios., , , , and . Future Gener. Comput. Syst., (2018)PCkAD: an unsupervised intrusion detection technique exploiting within payload n-gram location distribution., , and . CoRR, (2014)Modelling and simulation of complex manufacturing systems using statechart-based actors., , and . Simul. Model. Pract. Theory, 19 (2): 685-703 (2011)Model checking time-dependent system specifications using Time Stream Petri Nets and Uppaal., , and . Appl. Math. Comput., 218 (16): 8160-8186 (2012)Performance of a multi-agent system over a multi-core cluster managed by Terracotta., , , and . SpringSim (TMS-DEVS), page 125-133. SCS/ACM, (2011)Exploiting Content Spatial Distribution to Improve Detection of Intrusions., , and . ACM Trans. Internet Techn., 18 (2): 25:1-25:21 (2018)Adaptive Ladder Queue: Achieving O(1) Amortized Access Time in Practice., and . SIGSIM-PADS, page 101-104. ACM, (2018)Modelling and Simulation of a Defense Strategy to Face Indirect DDoS Flooding Attacks., , , and . IDCS, volume 8729 of Lecture Notes in Computer Science, page 263-274. Springer, (2014)A Simulation Model for the Analysis of DDoS Amplification Attacks., , , and . UKSim, page 267-272. IEEE, (2015)