Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tectons: Towards a Generalised Approach to Programming Systems of Systems., , and . ERCIM News, (2015)Security standards taxonomy for Cloud applications in Critical Infrastructure IT., , and . ICITST, page 645-646. IEEE, (2013)Covering Ethics in Cyber-Physical Systems Design., , and . ERCIM News, (2020)Digital Cities, Digital Tourism, Digital Arts ? A Research Agenda., , , and . ERCIM News, 2021 (126): 0 (2021)Towards a Security-Aware Benchmarking Framework for Function-as-a-Service., , and . CoRR, (2019)Trustworthy evidence gathering mechanism for multilayer cloud compliance., , and . ICITST, page 529-530. IEEE, (2013)Autonomous CPS Mobility Securely Designed., , , and . WOWMOM, page 1-6. IEEE, (2019)Towards flexible and secure end-to-end communication in industry 4.0., , , , , and . INDIN, page 883-888. IEEE, (2017)Towards trustworthy end-to-end communication in industry 4.0., , , , , , , , and . INDIN, page 889-896. IEEE, (2017)Artificial Intelligence for Safety-Critical Systems in Industrial and Transportation Domains: A Survey., , , , , , , , , and . ACM Comput. Surv., 56 (7): 176:1-176:40 (July 2024)