Author of the publication

Towards Runtime Monitoring for Malicious Behaviors Detection in Smart Ecosystems.

, , , , , , and . ISSRE Workshops, page 200-203. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BIECO Runtime Auditing Framework., , , and . CISIS-ICEUTE, volume 1400 of Advances in Intelligent Systems and Computing, page 181-191. Springer, (2021)Monitoring of Access Control Policy for Refinement and Improvements., , and . SWQD, volume 302 of Lecture Notes in Business Information Processing, page 17-36. Springer, (2018)Enhancing Business Process Performance Analysis through Coverage-Based Monitoring., , , and . QUATIC, page 35-43. IEEE Computer Society, (2016)Improving SAR ops using Wi-Fi and LoRa on UAV., and . PerCom Workshops, page 82-84. IEEE, (2022)Predictive Simulation for Building Trust Within Service-Based Ecosystems., , and . PerCom Workshops, page 34-37. IEEE, (2022)Integrating Access Control and Business Process for GDPR Compliance: A Preliminary Study., , and . ITASEC, volume 2315 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)A Life Cycle for Authorization Systems Development in the GDPR Perspective., and . ITASEC, volume 2597 of CEUR Workshop Proceedings, page 128-140. CEUR-WS.org, (2020)MENTORS: Monitoring Environment for System of Systems., , and . WEBIST, page 291-298. SCITEPRESS, (2021)An Industrial Experience in Comparing Manual vs. Automatic Test Cases Generation., , , and . SNPD, page 218-225. ACIS, (2003)The X-CREATE Framework - A Comparison of XACML Policy Testing Strategies., , , and . WEBIST, page 155-160. SciTePress, (2012)