A Heuristic Approach for Secure Service Composition Adaptation

Cyberpatterns ◽  
2014 ◽  
pp. 97-105
Author(s):  
Bo Zhou ◽  
David Llewellyn-Jones ◽  
David Lamb ◽  
Muhammad Asim ◽  
Qi Shi ◽  
...  
2004 ◽  
Author(s):  
Jeff Johnson ◽  
Talya N. Bauer ◽  
Leslie B. Hammer ◽  
Donald M. Truxillo

2013 ◽  
Vol E96.B (1) ◽  
pp. 10-19 ◽  
Author(s):  
Jun HUANG ◽  
Yanbing LIU ◽  
Ruozhou YU ◽  
Qiang DUAN ◽  
Yoshiaki TANAKA

Author(s):  
Hui Wang ◽  
Guang-Yu Sun ◽  
Qin-Yan Zhang ◽  
Kai-Min Liu ◽  
Meng Xi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document