Author of the publication

A social media-based over layer on the edge for handling emergency-related events.

, , , and . Comput. Electr. Eng., 96 (Part): 107570 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A social media-based over layer on the edge for handling emergency-related events., , , and . Comput. Electr. Eng., 96 (Part): 107570 (2021)PROCE: an agent-based PROcess Composition and execution Environment., , and . WOA, volume 741 of CEUR Workshop Proceedings, page 171-174. CEUR-WS.org, (2011)Modeling System Requirements in Modelica: Definition and Comparison of Candidate Approaches., , , and . EOOLT, volume 84 of Linköping Electronic Conference Proceedings, page 15-24. Linköping University Electronic Press, (2013)An exploratory analysis on the impact of Shodan scanning tool on the network attacks., , and . ARES, page 39:1-39:10. ACM, (2021)Fighting organized crime by automatically detecting money laundering-related financial transactions., , and . ARES, page 38:1-38:10. ACM, (2021)Similarity Analysis of Criminals on Social Networks: An Example on Twitter., , , and . ICCCN, page 1-9. IEEE, (2019)Modeling and simulation for system reliability analysis: The RAMSAS method., and . SoSE, page 155-160. IEEE, (2012)Towards Security as a Service (SecaaS): On the modeling of Security Services for Cloud Computing., , and . ICCST, page 1-6. IEEE, (2014)From the detection towards a pyramidal classification of terrorist propaganda., , and . J. Inf. Secur. Appl., (December 2023)On the simulation of smart grid environments., , and . SummerSim, page 17:1-17:12. ACM, (2019)