Author of the publication

Investigation of IT Security and Compliance Challenges in Security-as-a-Service for Cloud Computing.

, , , , , and . ISORC Workshops, page 124-129. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing K2 trees: A case for validating the maturity of network of practices., , , , , and . Computers & Mathematics with Applications, 63 (2): 427-436 (2012)Business Intelligence Security on the Clouds: Challenges, Solutions and Future Directions., , , , and . SOSE, page 137-144. IEEE Computer Society, (2013)Semantics and Pragmatics in Enterprise Architecture Through Transaction Agent Modelling., , and . ICISO, page 285-291. SciTePress, (2010)Measuring Efficiency in Opportunistic Ad Hoc Networks., and . Journal of Interconnection Networks, 12 (3): 189-203 (2011)Capturing and Specifying Multiagent Systems for the Management of Community Healthcare.. Advanced Computational Intelligence Paradigms in Healthcare (1), volume 48 of Studies in Computational Intelligence, Springer, (2007)Agency and the Virtual Campus: The TrAM Approach.. INCoS, page 8-15. IEEE Computer Society, (2010)A Non-genuine Message Detection Method Based on Unstructured Datasets., , and . 3PGCIC, page 597-600. IEEE Computer Society, (2015)Monitoring of oscillatory characteristics of pulverized coal flames through image processing and spectral analysis., , , and . IEEE Trans. Instrumentation and Measurement, 55 (1): 226-231 (2006)Dot-base62x: A Compact Textual Representation of IPv6 Address for Clouds., , , , , and . UCC, page 427-432. IEEE Computer Society, (2011)Customized Profile Accessibility and Privacy for Users of Social Networks., , , and . EIDWT, page 306-310. (2012)