Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Application Structure Design for Java EE Applications., , and . RACS, page 159-164. ACM, (2016)Towards effective adaptive user interfaces design., , and . RACS, page 373-380. ACM, (2013)Context-Aware Security Using Internet of Things Devices., , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 706-713. Springer, (2017)On isolation-driven automated module decomposition., , and . RACS, page 302-307. ACM, (2018)Survey on Compromise-Defensive System Design., and . ICISA, volume 514 of Lecture Notes in Electrical Engineering, page 513-521. Springer, (2018)On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices., , , , , , , , and . IEEE Access, (2020)Systematic Review of Authentication and Authorization Advancements for the Internet of Things., , , , and . Sensors, 22 (4): 1361 (2022)Automated error log resolution: a case study., , , , , and . SAC, page 1298-1304. ACM, (2021)Intelligent token-based code clone detection system for large scale source code., , and . RACS, page 256-260. ACM, (2019)Filling The Gaps in Microservice Frontend Communication: Case for New Frontend Patterns., and . CLOSER, page 184-193. SCITEPRESS, (2023)