Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance evaluation of service searching using aggregation in peer-to-peer Service Overlay Networks., , and . Integrated Network Management, page 642-645. IEEE, (2011)A Network Intrusion Detection System for Building Automation and Control Systems., , and . IEEE Access, (2023)A Europe-Brazil Context for Secure Data Analytics in the Cloud., , , , , , and . IEEE Secur. Priv., 16 (6): 52-60 (2018)A Survey of Cloud Computing Migration Issues and Frameworks., , and . WorldCIST (1), volume 275 of Advances in Intelligent Systems and Computing, page 161-170. Springer, (2014)Peer Selection in P2P Service Overlays Using Geographical Location Criteria., , and . ICCSA (2), volume 7334 of Lecture Notes in Computer Science, page 234-248. Springer, (2012)Current and Future Trends in Mobile Device Forensics: A Survey., , , and . ACM Comput. Surv., 51 (3): 46:1-46:31 (2018)Human-Centered Design - The Importance of Usability Tests in the Development of Technological Objects., , , and . AHFE (3), volume 1203 of Advances in Intelligent Systems and Computing, page 331-338. Springer, (2020)Driving Workload Indicators: The Case of Senior Drivers., , , and . AHFE (20), volume 604 of Advances in Intelligent Systems and Computing, page 604-615. Springer, (2017)A Component-Based Approach for Integrating Mobile Agents Into the Existing Web Infrastructure., , , , and . SAINT, page 100-108. IEEE Computer Society, (2002)Enabling PreOS Desktop Management., and . Integrated Network Management, volume 246 of IFIP Conference Proceedings, page 321-334. Kluwer, (2003)