479.575 PEOPLE
People | Locations | Statistics |
---|---|---|
Ziakopoulos, Apostolos | Athens |
|
Vigliani, Alessandro | Turin |
|
Catani, Jacopo | Rome |
|
Statheros, Thomas | Stevenage |
|
Utriainen, Roni | Tampere |
|
Guglieri, Giorgio | Turin |
|
Martínez Sánchez, Joaquín |
| |
Tobolar, Jakub |
| |
Volodarets, M. |
| |
Piwowar, Piotr |
| |
Tennoy, Aud | Oslo |
|
Matos, Ana Rita |
| |
Cicevic, Svetlana |
| |
Sommer, Carsten | Kassel |
|
Liu, Meiqi |
| |
Pirdavani, Ali | Hasselt |
|
Niklaß, Malte |
| |
Lima, Pedro | Braga |
|
Turunen, Anu W. |
| |
Antunes, Carlos Henggeler |
| |
Krasnov, Oleg A. |
| |
Lopes, Joao P. |
| |
Turan, Osman |
| |
Lučanin, Vojkan | Belgrade |
|
Tanaskovic, Jovan |
|
Pecchia, Antonio
in Cooperation with on an Cooperation-Score of 37%
Topics
- air traffic
- air traffic control
- data
- industry
- computer science
- variable
- software
- implementation
- waste product
- production
- coding system
- architecture
- positioning
- profit
- engineering
- graph
- visibility
- uncertainty
- instrumentation
- abstract
- indicating instrument
- monitoring
- filter
- experiment
- security
- corporation
- filtration
- alertness
- computer network
- recall campaign
- signal processing
- theory
- information system
- game theory
- algorithm
- behavior
- specification
- face
- hub
- deviation
- distributed control
- crisis management
- deforestation
- case study
- guideline
- control system
- mining
- data mining
- sampling
- time window
- middleware
- traffic control system
- modeling
- base line
- configuration management
- reliability
- crash
- computer operating system
- fault tolerance
- assessment
- computer programming
- diagnosis
- workload
- downtime
- information technology
- defense
- developer
- costs
- design
- system safety
- system architecture
- estimate
- leakage
- computer security
- embedded system
- market
- failure analysis
- show 47 more
Publications (13/13 displayed)
- 2020An empirical analysis of error propagation in critical software systemscitations
- 2019Contextual filtering and prioritization of computer application logs for security situational awarenesscitations
- 2019Security Log Analysis in Critical Industrial Systems Exploiting Game Theoretic Feature Selection and Evidence Combinationcitations
- 2018A framework for on-line timing error detection in software systemscitations
- 2018Contextual anomaly detection for a critical industrial system based on logs and metricscitations
- 2018Challenges and Directions in Security Information and Event Management (SIEM)citations
- 2014What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Studycitations
- 2014Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systemscitations
- 2014Event Logging in an Industrial Development Process: Practices and Reengineering Challengescitations
- 2011Criticality-Driven Component Integration in Complex Software Systemscitations
- 2010Memory leak analysis of mission-critical middlewarecitations
- 2009An experiment in memory leak analysis with a mission-critical middleware for air traffic controlcitations
- 2009A failure analysis of data distribution middleware in a mission-critical system for air traffic controlcitations
Places of action