Search for persons
X
?
2023 10th International Conference on Future Internet of Things and Cloud (FiCloud) ,
2
Threat Intelligence Sharing Component in the Service Mesh A..:
, In:
?
2022 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C) ,
3
Engineering Collective Adaptive Systems with CASSim:
, In:
?
2022 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C) ,
4
Using Design Questions to Analyze System Adaptation Potenti..:
, In:
?
2019 IEEE International Symposium on Technologies for Homeland Security (HST) ,
5
Extending Over-the-Air Libraries to Secure ESP8266 Updates:
, In:
?
2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) ,
6
A Smart Contract Grammar to Protect IoT Firmware Updates us..:
, In:
?
HCI for Cybersecurity, Privacy and Trust; Lecture Notes in Computer Science ,
7
Trust in Automated Software Repair: The Effects of Repair S..:
, In:
?
Proceedings of the International Conference on Omni-Layer Intelligent Systems ,
8
Securing Over-The-Air IoT Firmware Updates using Blockchain:
, In:
?
Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems ,
9
Toward evaluating the impact of self-adaptation on security..:
, In:
?
2018 IEEE 12th International Conference on Self-Adaptive and Self-Organizing Systems (SASO) ,
10
Self-Adaptation Strategies to Maintain Security Assurance C..:
, In:
?
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems ,
11
MTL Robustness for Path Planning with A*:
, In:
?
2013 IEEE 14th International Conference on Mobile Data Management ,
14
Analysis of End-to-End SOA Security Protocols with Mobile D..:
, In:
?
Proceedings of the 18th ACM symposium on Access control models and technologies ,
15