Author of the publication

Where are the Cascades from Blazar Jets? An Emerging Tension in the $\gamma$-ray sky

, , , and . (2023)cite arxiv:2303.01524.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving expected tail loss estimates with neural networks., , and . Intell. Syst. Account. Finance Manag., 13 (2): 81-94 (2005)Onto-CARMEN: Ontology-driven approach for Cyber-Physical System Security Requirements meta-modelling and reasoning., , , , and . Internet Things, (December 2023)An MDA approach for developing secure OLAP applications: Metamodels and transformations., , , and . Comput. Sci. Inf. Syst., 12 (2): 541-565 (2015)Infinite Continuous Feature Model for Psychiatric Comorbidity Analysis., , , , and . Neural Comput., 28 (2): 354-381 (2016)Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach., , , , and . OTM Conferences (2), volume 5332 of Lecture Notes in Computer Science, page 1052-1068. Springer, (2008)Mortadelo: A Model-Driven Framework for NoSQL Database Design., , , , and . MEDI, volume 11163 of Lecture Notes in Computer Science, page 41-57. Springer, (2018)An ontology-based secure design framework for graph-based databases., , , , , and . Comput. Stand. Interfaces, (March 2024)How the Conceptual Modelling Improves the Security on Document Databases., , , , , and . ER, volume 11157 of Lecture Notes in Computer Science, page 497-504. Springer, (2018)Hacia la Implementación Automática de Almacenes de Datos Seguros en Herramientas OLAP., , , , and . JISBD, page 205-216. (2008)Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs., , , , and . ARES, page 528-533. IEEE Computer Society, (2009)