Author:
Spanoudakis George,Kloukinas Christos,Mahbub Khaled
Reference34 articles.
1. Adler I et al (1989) An Implementation of Karmarkar's Algorithm for Linear Programming. Mathematical Programming, 44: 297–335
2. Lazarevic A, Kumar V, Srivastava J (2006) Intrusion Detection: A Survey. Massive Computing, In: Kumar V, Srivastava J, Lazarevic A (eds), Managing Cyber Threats: Issues, Approaches and Challenges, Springer, ISBN 0387242260
3. Armenteros A, Garcia L, Muñoz A, Maña A (2008) Realising the Potential of SERENITY in Emerging AmI Ecosystems: Implications and Challenges. In: Spanoudakis G, Maña A, Kokolakis S (eds) Security and Dependability for Ambient Intelligence, Information Security Series, Springer
4. Avizienis A, Larpie C, Randell B (2001). Fundamental Concepts of Dependability. LAAS-CNRS, Tech. Rep. N01145.
5. Baresi L, Guinea S (2005) Dynamo: Dynamic Monitoring of WS-BPEL Processes. Proceedings of 3rd International Conference On Service Oriented Computing, Amsterdam, The Netherlands.
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献