The THREAT-ARREST Cyber Range Platform | 0 | 0.34 | 2021 |
Pattern Based Design and Verification of Secure Service Compositions | 2 | 0.39 | 2020 |
A Pattern-Driven Adaptation in IoT Orchestrations to Guarantee SPDI Properties. | 0 | 0.34 | 2020 |
Evaluation of Novel Approaches to Software Engineering - 14th International Conference, ENASE 2019, Heraklion, Crete, Greece, May 4-5, 2019, Revised Selected Papers | 0 | 0.34 | 2020 |
Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments | 0 | 0.34 | 2019 |
Towards The Insurance Of Healthcare Systems | 0 | 0.34 | 2019 |
Smart End-to-end Massive IoT Interoperability, Connectivity and Security (SEMIoTICS). | 0 | 0.34 | 2019 |
Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective | 0 | 0.34 | 2019 |
Evaluation of Novel Approaches to Software Engineering - 13th International Conference, ENASE 2018, Funchal, Madeira, Portugal, March 23-24, 2018, Revised Selected Papers | 0 | 0.34 | 2019 |
Architectural Patterns for Secure IoT Orchestrations | 2 | 0.43 | 2019 |
Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things | 0 | 0.34 | 2018 |
Reactive security for SDN/NFV‐enabled industrial networks leveraging service function chaining | 4 | 0.59 | 2018 |
A big data repository and architecture for managing hearing loss related data | 2 | 0.51 | 2018 |
Big Data Assurance Evaluation: An SLA-Based Approach | 0 | 0.34 | 2018 |
The Interoperability of Things: Interoperable solutions as an enabler for IoT and Web 3.0 | 2 | 0.42 | 2018 |
Fault Tolerance Using an SDN Pattern Framework. | 1 | 0.35 | 2017 |
Cloud Certification Process Validation Using Formal Methods. | 0 | 0.34 | 2017 |
Public Health Policy for Management of Hearing Impairments Based on Big Data Analytics: EVOTION at Genesis | 3 | 0.59 | 2017 |
Towards Transparent and Trustworthy Cloud. | 0 | 0.34 | 2017 |
Multiparametric Data Analysis For Diagnostic Decision Support In Balance Disorders | 0 | 0.34 | 2016 |
Patterns for the design of secure and dependable software defined networks. | 4 | 0.46 | 2016 |
Mining balance disorders' data for the development of diagnostic decision support systems. | 1 | 0.43 | 2016 |
A Pattern-Based Approach for Designing Reliable Cyber-Physical Systems. | 1 | 0.37 | 2015 |
EMBalance data repository modeling and clinical application | 0 | 0.34 | 2015 |
Coverage-Based Testing for Service Level Agreements | 6 | 0.46 | 2015 |
Monitoring-Based Certification of Cloud Service Security. | 3 | 0.43 | 2015 |
MBotCS: A Mobile Botnet Detection System Based on Machine Learning. | 1 | 0.35 | 2015 |
Diagnosis of balance disorders using decision support systems based on data mining techniques | 1 | 0.63 | 2015 |
Continuous Certification of Non-repudiation in Cloud Storage Services | 3 | 0.41 | 2014 |
A Multi-layer and MultiTenant Cloud Assurance Evaluation Methodology | 5 | 0.58 | 2014 |
A Certification Framework for Cloud Security Properties: The Monitoring Path. | 7 | 0.46 | 2014 |
Towards Hybrid Cloud Service Certification Models | 5 | 0.48 | 2014 |
Designing Secure Service Workflows in BPEL. | 1 | 0.36 | 2014 |
Discovering Secure Service Compositions. | 2 | 0.41 | 2014 |
Generating Secure Service Compositions. | 0 | 0.34 | 2014 |
A lightweight framework for secure life-logging in smart environments | 5 | 0.51 | 2013 |
A Privacy-Level Model of User-Centric Cyber-Physical Systems. | 6 | 0.46 | 2013 |
Biologically Inspired Near Extinct System Reconstruction | 0 | 0.34 | 2013 |
Assessing the genuineness of events in runtime monitoring of cyber systems | 0 | 0.34 | 2013 |
Identifying Test Requirements by Analyzing SLA Guarantee Terms | 4 | 0.41 | 2012 |
Formal Certification and Compliance for Run-Time Service Environments | 3 | 0.47 | 2012 |
Finding Secure Compositions of Software Services: Towards a Pattern Based Approach. | 4 | 0.41 | 2012 |
Constructing Secure Service Compositions with Patterns | 6 | 0.50 | 2012 |
SMaRT: a workbench for reporting the monitorability of services from SLAs | 4 | 0.45 | 2011 |
Taming the Cloud: Safety, Certification and Compliance for Software Services - Keynote at the Workshop on Engineering Service-Oriented Applications (WESOA) 2011. | 0 | 0.34 | 2011 |
Proactive SLA Negotiation for Service Based Systems: Initial Implementation and Evaluation Experience | 7 | 0.48 | 2011 |
Advanced service monitoring configurations with SLA decomposition and selection | 17 | 1.25 | 2011 |
Predicting Software Service Availability: Towards a Runtime Monitoring Approach | 3 | 0.40 | 2011 |
EVEREST+: run-time SLA violations prediction. | 4 | 0.45 | 2010 |
Discovering Services during Service-Based System Design Using UML | 25 | 0.81 | 2010 |