Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multidatabase Interdependencies in Industry., and . SIGMOD Conference, page 483-486. ACM Press, (1993)Enterprise Data Quality: A Pragmatic Approach., , , , and . Inf. Syst. Frontiers, 1 (3): 279-301 (1999)Zero-Day Attack Identification in Streaming Data Using Semantics and Spark., , , , and . BigData Congress, page 121-128. IEEE Computer Society, (2017)Using Context in Semantic Data Integration. IBIS - International Journal of Interoperability in Business Information Systems, 1 (3): 9-22 (December 2006)Measuring Software Security Using Improved CWE Base Score., , and . CIKM Workshops, volume 3052 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)Beyond data: contextual information fusion for cyber security analytics., and . SAC, page 73-79. ACM, (2016)Semantic integration of government data for water quality management., , , , and . Gov. Inf. Q., 24 (4): 716-735 (2007)Searching for relevant software change artifacts using semantic networks., , , , and . SAC, page 496-500. ACM, (2009)On the Verification of Software Vulnerabilities During Static Code Analysis Using Data Mining Techniques - (Short Paper)., and . OTM Conferences (2), volume 10574 of Lecture Notes in Computer Science, page 99-106. Springer, (2017)Enforcing Data Dependencies in Cooperative Information Systems., and . ICICIS, page 332-341. IEEE Computer Society, (1993)