Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Demo on Using Visualization to Aid Run-Time Verification of Dynamic Service Systems.. ICST Workshops, page 319-324. IEEE Computer Society, (2010)Developing Reusable Knowledge Processors for Smart Environments., and . SAINT, page 286-291. IEEE Computer Society, (2011)Visualizing structure and quality properties of Smart Spaces., , and . ISCC, page 1-3. IEEE Computer Society, (2010)Privacy-friendly Discovery of Common Friends in P2P Networks., , , and . FRUCT, page 181-188. IEEE, (2022)Mitigating IoT security threats with a trusted Network element., , , and . ICITST, page 260-265. IEEE, (2016)Supporting Situation-Awareness in Smart Spaces., , and . GPC Workshops, volume 7096 of Lecture Notes in Computer Science, page 14-23. Springer, (2011)Combining real-time risk visualization and anomaly detection., , , and . ECSA (Companion), page 55:1-55:7. ACM, (2018)A tool for security metrics modeling and visualization, , , and . Proceedings of the 2014 European Conference on Software Architecture Workshops, page 3. ACM, (2014)Privacy-Aware Contact Sharing for Groups in P2P Networks., , and . Int. J. Embed. Real Time Commun. Syst., 12 (4): 36-54 (2021)Context-Awareness Micro-architecture for Smart Spaces., , and . GPC, volume 6646 of Lecture Notes in Computer Science, page 148-157. Springer, (2011)