Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the impact of emergent properties on SoS security., , , and . SoSE, page 1-6. IEEE, (2016)Challenging Anomaly Detection in Complex Dynamic Systems., , and . SRDS, page 213-214. IEEE Computer Society, (2016)On Algorithms Selection for Unsupervised Anomaly Detection., , and . PRDC, page 279-288. IEEE, (2018)Meeting the challenges in the design and evaluation of a trackside real-time safety-critical system., , , and . ISORC, page 1-10. IEEE Computer Society, (2013)Towards a Framework for Self-Adaptive Reliable Network Services in Highly-Uncertain Environments., , , , and . ISORC Workshops, page 184-193. IEEE Computer Society, (2010)A Service Discovery Approach for Testing Dynamic SOAs., , and . ISORC Workshops, page 133-142. IEEE Computer Society, (2011)Identification of critical situations via Event Processing and Event Trust Analysis., , , , , and . Knowl. Inf. Syst., 52 (1): 147-178 (2017)Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities., , , , , , , , , and 1 other author(s). CoRR, (2014)A Resilient SIL 2 Driver Machine Interface for Train Control Systems., , , , , and . DepCoS-RELCOMEX, page 365-374. IEEE Computer Society, (2008)On trustworthy measurements when testing dependable systems: a discussion and experiences., and . IJCCBS, 6 (2): 154-170 (2015)