Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices., , , , , , , , and . IEEE Access, (2020)On isolation-driven automated module decomposition., , and . RACS, page 302-307. ACM, (2018)Survey on Compromise-Defensive System Design., and . ICISA, volume 514 of Lecture Notes in Electrical Engineering, page 513-521. Springer, (2018)Adaptive Application Structure Design for Java EE Applications., , and . RACS, page 159-164. ACM, (2016)Towards effective adaptive user interfaces design., , and . RACS, page 373-380. ACM, (2013)Context-Aware Security Using Internet of Things Devices., , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 706-713. Springer, (2017)Navigating an Interdisciplinary Approach to Cybercrime Research., , , , , and . HICSS, page 3611-3620. ScholarSpace, (2023)Intelligent token-based code clone detection system for large scale source code., , and . RACS, page 256-260. ACM, (2019)Automated error log resolution: a case study., , , , , and . SAC, page 1298-1304. ACM, (2021)Filling The Gaps in Microservice Frontend Communication: Case for New Frontend Patterns., and . CLOSER, page 184-193. SCITEPRESS, (2023)