Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trustworthy evidence gathering mechanism for multilayer cloud compliance., , and . ICITST, page 529-530. IEEE, (2013)Security standards taxonomy for Cloud applications in Critical Infrastructure IT., , and . ICITST, page 645-646. IEEE, (2013)Autonomous CPS Mobility Securely Designed., , , and . WOWMOM, page 1-6. IEEE, (2019)Tectons: Towards a Generalised Approach to Programming Systems of Systems., , and . ERCIM News, (2015)Information Assurance System in the Arrowhead Project., , and . ERCIM News, (2014)Towards a Security-Aware Benchmarking Framework for Function-as-a-Service., , and . CoRR, (2019)Self-Adaptation Applied to Peer-Set Maintenance in Chord via a Generic Autonomic Management Framework., , and . SASO Workshops, page 9-16. IEEE Computer Society, (2010)Towards Continuous Cloud Service Assurance for Critical Infrastructure IT., , , , and . FiCloud, page 175-182. IEEE Computer Society, (2014)Impact of Critical Infrastructure Requirements on Service Migration Guidelines to the Cloud., , , , and . FiCloud, page 1-8. IEEE Computer Society, (2015)The case for heterogeneous WLAN environments for converged networks., , , and . ICNC, page 71-76. IEEE Computer Society, (2013)