Author of the publication

Towards viable computer systems: a set theory interpretation of ecological dependence within Beer's self-organizing viable system model.

, , , , and . MEDES, page 73-77. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Digital Image Watermark Attacks., , , and . CCNC, page 1-5. IEEE, (2010)Buffer Overrun Prevention Through Component Composition Analysis., , , and . COMPSAC (1), page 156-163. IEEE Computer Society, (2005)On Securing MANET Routing Protocol Against Control Packet Dropping., , , , and . ICPS, page 100-108. IEEE Computer Society, (2007)A security framework for executables in a ubiquitous computing environment., , , and . GLOBECOM, page 2158-2163. IEEE, (2004)Efficient autonomous signature exchange on ubiquitous networks., , and . J. Netw. Comput. Appl., 35 (6): 1793-1806 (2012)The challenges of secure and trustworthy service composition in the Future Internet., , and . SoSE, page 329-334. IEEE, (2011)Red Button and Yellow Button: Usable Security for Lost Security Tokens., , , and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 165-171. Springer, (2016)Networked Appliances: Manipulation of 3D Multimedia Streams., , , , and . CCNC, page 1117-1122. IEEE, (2008)An Knowledge Model for Self-regenerative Service Activations Adaptation Across Standards., , and . CIS (1), volume 3801 of Lecture Notes in Computer Science, page 1074-1081. Springer, (2005)Data Encryption Using Bio Molecular Information. International Journal on Cryptography and Information Security (IJCIS), 4 (3): 21-33 (September 2014)