Author of the publication

Toward the Formalization of Business Process Model and Notation.

, , and . SoMeT, volume 337 of Frontiers in Artificial Intelligence and Applications, page 248-264. IOS Press, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Implementation of Network Security Policies., , and . PST, page 161-166. (2004)LyeeBuilder., , , and . SoMeT, volume 129 of Frontiers in Artificial Intelligence and Applications, page 83-99. IOS Press, (2005)Performance Evaluation of Data Scheduling in IEEE802.16e in VANET Traffic Context., , and . DeSE, page 58-63. IEEE, (2018)Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method., and . J. Comput. Networks Commun., (2012)$K$-Smali: An Executable Semantics for Program Verification of Reversed Android Applications., , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 321-337. Springer, (2021)Enforcing Security Policies Using Algebraic Approach., and . SoMeT, volume 182 of Frontiers in Artificial Intelligence and Applications, page 84-98. IOS Press, (2008)Towards the Correctness of Security Protocols., and . MFPS, volume 83 of Electronic Notes in Theoretical Computer Science, page 55-98. Elsevier, (2003)From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm., , , and . WETICE, page 256-262. IEEE Computer Society, (1997)Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic., , and . ARES, page 206-212. IEEE Computer Society, (2007)Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering Algorithm., , , and . FPS, volume 10128 of Lecture Notes in Computer Science, page 161-178. Springer, (2016)