Found: 23
Select item for more details and to access through your institution.
Elaborating Analogies From Conceptual Models.
- Published in:
- International Journal of Intelligent Systems, 1996, v. 11, n. 11, p. 917, doi. 10.1002/(sici)1098-111x(199611)11:11<917::aid-int4>3.3.co;2-v
- By:
- Publication type:
- Article
IT-OUTSOURCING AND IT-OFFSHORING:: TRENDS AND IMPACTS ON SE/KE CURRICULA.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2007, v. 17, n. 5, p. 663, doi. 10.1142/S0218194007003409
- By:
- Publication type:
- Article
GUEST EDITORS' INTRODUCTION.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2007, v. 17, n. 2, p. 167, doi. 10.1142/S0218194007003203
- By:
- Publication type:
- Article
GUEST EDITORS' INTRODUCTION.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2005, v. 15, n. 5, p. 747, doi. 10.1142/S0218194005002579
- By:
- Publication type:
- Article
EVIDENTIAL DIAGNOSIS OF INCONSISTENCIES IN OBJECT-ORIENTED DESIGNS.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2004, v. 14, n. 2, p. 141, doi. 10.1142/S0218194004001610
- By:
- Publication type:
- Article
Supporting the reconciliation of models of object behaviour.
- Published in:
- Software & Systems Modeling, 2004, v. 3, n. 4, p. 273, doi. 10.1007/s10270-004-0054-1
- By:
- Publication type:
- Article
The Green Blockchains of Circular Economy.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 16, p. 2008, doi. 10.3390/electronics10162008
- By:
- Publication type:
- Article
SPD-Safe: Secure Administration of Railway Intelligent Transportation Systems.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 1, p. 92, doi. 10.3390/electronics10010092
- By:
- Publication type:
- Article
NextGEM: Next-Generation Integrated Sensing and Analytical System for Monitoring and Assessing Radiofrequency Electromagnetic Field Exposure and Health.
- Published in:
- International Journal of Environmental Research & Public Health, 2023, v. 20, n. 12, p. 6085, doi. 10.3390/ijerph20126085
- By:
- Publication type:
- Article
Swarm-intelligence for the modern ICT ecosystems.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 4, p. 2951, doi. 10.1007/s10207-024-00869-1
- By:
- Publication type:
- Article
RAMA: a risk assessment solution for healthcare organizations.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 3, p. 1821, doi. 10.1007/s10207-024-00820-4
- By:
- Publication type:
- Article
Cybersecurity training and healthcare: the AERAS approach.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1527, doi. 10.1007/s10207-023-00802-y
- By:
- Publication type:
- Article
NON-INTRUSIVE MONITORING OF SERVICE-BASED SYSTEMS.
- Published in:
- International Journal of Cooperative Information Systems, 2006, v. 15, n. 3, p. 325, doi. 10.1142/S0218843006001384
- By:
- Publication type:
- Article
Proactive and Reactive Runtime Service Discovery: A Framework and Its Evaluation.
- Published in:
- IEEE Transactions on Software Engineering, 2013, v. 39, n. 7, p. 954, doi. 10.1109/TSE.2012.84
- By:
- Publication type:
- Article
Discovering Services during Service-Based System Design Using UML.
- Published in:
- IEEE Transactions on Software Engineering, 2010, v. 36, n. 3, p. 371, doi. 10.1109/TSE.2009.88
- By:
- Publication type:
- Article
CYRA: A Model-Driven CYber Range Assurance Platform.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 11, p. 5165, doi. 10.3390/app11115165
- By:
- Publication type:
- Article
Towards a Collection of Security and Privacy Patterns.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 4, p. 1396, doi. 10.3390/app11041396
- By:
- Publication type:
- Article
Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 16, p. 5702, doi. 10.3390/app10165702
- By:
- Publication type:
- Article
Reactive security for SDN/NFV‐enabled industrial networks leveraging service function chaining.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2018, v. 29, n. 7, p. 1, doi. 10.1002/ett.3269
- By:
- Publication type:
- Article
A Data-informed Public Health Policy-Makers Platform.
- Published in:
- International Journal of Environmental Research & Public Health, 2020, v. 17, n. 9, p. 3271, doi. 10.3390/ijerph17093271
- By:
- Publication type:
- Article
Fully Synthetic Longitudinal Real-World Data From Hearing Aid Wearers for Public Health Policy Modeling.
- Published in:
- Frontiers in Neuroscience, 2019, p. 1, doi. 10.3389/fnins.2019.00850
- By:
- Publication type:
- Article
Comprehensive Monitoring of BPEL Processes.
- Published in:
- IEEE Internet Computing, 2010, v. 14, n. 3, p. 50, doi. 10.1109/MIC.2010.66
- By:
- Publication type:
- Article
A UML-based static verification framework for security.
- Published in:
- Requirements Engineering, 2010, v. 15, n. 1, p. 95, doi. 10.1007/s00766-009-0091-y
- By:
- Publication type:
- Article