Author of the publication

A Methodology to Evaluate Agent Oriented Software Engineering Techniques.

, , , , and . HICSS, page 60. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Moving Toward Trustworthy Systems: R&D Essentials., and . Computer, 43 (9): 31-40 (2010)Composing, analyzing and validating software models to assess the performability of competing design candidates., and . Ann. Softw. Eng., (1999)On quantum authentication protocols., , , and . GLOBECOM, page 5. IEEE, (2005)Multi-Agent System Case Studies in Command and Control, Information Fusion and Datat Managment., , and . Informatica (Slovenia), 28 (1): 78-89 (2004)Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation., and . SSCI, page 455-462. IEEE, (2015)Reliability analysis of CSP specifications using Petri nets and Markov processes., , , and . HICSS (2), page 516-524. IEEE Computer Society, (1995)Examining Coincident Failures and Usage Profiles in Reliability Analysis of an Embedded Vehicle Sub-System., , and . ESM, page 558-563. SCS Europe, (2002)Specification and Analysis of Real-Time Systems Using CSP and Petri Nets., , and . Int. J. Softw. Eng. Knowl. Eng., 6 (2): 229-248 (1996)Voice Feature Learning using Convolutional Neural Networks Designed to Avoid Replay Attacks., , and . SSCI, page 1845-1851. IEEE, (2020)A Best-Effort Damage Mitigation Model for Cyber-Attacks on Smart Grids., , , and . COMPSAC (2), page 510-515. IEEE Computer Society, (2018)978-1-5386-2667-2.