Author of the publication

GEMOM - Significant and Measurable Progress beyond the State of the Art.

, , , , , and . ICSNC, page 191-196. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MeSSa 2016 - Workshop on Monitoring and Measurability of Software and Network Security, , and . (2016)Security Aspects of Short-Range Wireless Communication--Risk Analysis for the Healthcare Application, , and . International Journal of Intelligent Computing Research (IJICR), (2014)Executable Object-Oriented Graphical Models of Real-Time Software., , , and . RTS, page 104-109. IEEE, (1993)Architecture for High Confidence Cloud Security Monitoring., , , , and . IC2E, page 195-200. IEEE Computer Society, (2015)Security risks in the short-range communication of ubiquitous application., , and . ICITST, page 612-617. IEEE, (2013)A risk-driven security analysis and metrics development for WSN-MCN router., , and . ICTC, page 342-347. IEEE, (2013)Towards Security Evaluation based on Evidence Collection.. ISSA, page 1-10. ISSA, Pretoria, South Africa, (2006)Identification of Basic Measurable Security Components in Software-Intensive Systems.. ISSA, page 69-80. ISSA, Pretoria, South Africa, (2009)Towards Federated Learning-based Collaborative Adaptive Cybersecurity for Multi-microgrids., , , and . WINSYS, page 83-90. SCITEPRESS, (2021)A Secure Running Environment for Multiple Platforms.. ICSOFT (2), page 129-134. INSTICC Press, (2009)