From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

TAMEC: Trusted Augmented Mobile Execution on Cloud., , , , , , и . Sci. Program., (2021)Hidden in plain sight: Automatically identifying security requirements from natural language artifacts., , , и . RE, стр. 183-192. IEEE Computer Society, (2014)A Distributed Middleware Solution for Context Awareness in Ubiquitous Systems., , , , и . RTCSA, стр. 451-454. IEEE Computer Society, (2005)Service Delivery in Context Aware Environments: Lookup and Access Control Issues., , , , и . RTCSA, стр. 455-458. IEEE Computer Society, (2005)Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware Approach., , , и . ICCSA (2), том 3481 из Lecture Notes in Computer Science, стр. 1096-1105. Springer, (2005)Quality-aware trajectory planning of cellular connected UAVs., , , , , , и . DroneCom@MobiCom, стр. 79-85. ACM, (2020)Middleware infrastructure for context-aware ubiquitous computing systems, , , , и . ..., (2005)Using templates to elicit implied security requirements from functional requirements - a controlled experiment., , , и . ESEM, стр. 22:1-22:10. ACM, (2014)A grounded analysis of experts' decision-making during security assessments., , , и . J. Cybersecur., 2 (2): 147-163 (2016)Systematically Developing Prevention, Detection, and Response Patterns for Security Requirements., , и . RE Workshops, стр. 62-67. IEEE Computer Society, (2016)