Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TAMEC: Trusted Augmented Mobile Execution on Cloud., , , , , , and . Sci. Program., (2021)Hidden in plain sight: Automatically identifying security requirements from natural language artifacts., , , and . RE, page 183-192. IEEE Computer Society, (2014)A Distributed Middleware Solution for Context Awareness in Ubiquitous Systems., , , , and . RTCSA, page 451-454. IEEE Computer Society, (2005)Service Delivery in Context Aware Environments: Lookup and Access Control Issues., , , , and . RTCSA, page 455-458. IEEE Computer Society, (2005)Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware Approach., , , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 1096-1105. Springer, (2005)Quality-aware trajectory planning of cellular connected UAVs., , , , , , and . DroneCom@MobiCom, page 79-85. ACM, (2020)Grid Access Middleware for Handheld Devices., , , , and . EGC, volume 3470 of Lecture Notes in Computer Science, page 1002-1011. Springer, (2005)Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private Networks., , and . ICCCN, page 1-11. IEEE, (2020)Towards a framework to measure security expertise in requirements analysis., , , and . ESPRE, page 13-18. IEEE Computer Society, (2014)A grounded analysis of experts' decision-making during security assessments., , , and . J. Cybersecur., 2 (2): 147-163 (2016)