Author of the publication

Packaging Quality of Service Control Behaviors for Reuse.

, , , and . Symposium on Object-Oriented Real-Time Distributed Computing, page 375-385. IEEE Computer Society, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Use of machine learning in big data analytics for insider threat detection., , , and . MILCOM, page 915-922. IEEE, (2015)Remote Management of Boundary Protection Devices with Information Restrictions., , , and . AAAI, page 9398-9403. AAAI Press, (2019)An abstract interface for cyber-defense mechanisms., , , and . CSIIRW, page 37:1-37:3. ACM, (2008)Federated Access to Cyber Observables for Detection of Targeted Attacks., , , , and . MILCOM, page 60-66. IEEE, (2014)Learning Quantitative Knowledge for Multiagent Coordination., , , and . AAAI/IAAI, page 24-31. AAAI Press / The MIT Press, (1999)Advanced Protected Services - A Concept Paper on Survivable Service-Oriented Systems., , , , , and . ISORC Workshops, page 158-165. IEEE Computer Society, (2010)Adaptive Use of Network-Centric Mechanisms in Cyber-Defense., , , and . ISORC, page 183-192. IEEE Computer Society, (2003)Using Ontologies to Quantify Attack Surfaces., , , , , and . STIDS, volume 1788 of CEUR Workshop Proceedings, page 10-18. CEUR-WS.org, (2016)Cooperative red teaming of a prototype surivable service-oriented system., , , , , , , and . MILCOM, page 1-6. IEEE, (2012)Understanding the Vulnerabilities of a SOA Platform - A Case Study., , and . NCA, page 182-187. IEEE Computer Society, (2010)