Select Publications
Books
2021, Welcome message from the INCoS-2020 Organizing Committee
,2018, Cyber Security for Cyber Physical Systems, Springer
,2018, Measuring and Analysing the Use of Ontologies, Springer Verlag, http://dx.doi.org/10.1007/978-3-319-75681-3
,2018, Preface
,2013, Risk Assessment and Management in the Networked Economy, http://dx.doi.org/10.1007/978-3-642-28690-2
,Book Chapters
2024, 'A biological data-driven mining technique by using hybrid classifiers with rough set', in Research Anthology on Bioinformatics, Genomics, and Computational Biology, pp. 1 - 20, http://dx.doi.org/10.4018/979-8-3693-3026-5.ch001
,2020, 'A Customer-Oriented Assortment Selection in the Big Data Environment', in Lecture Notes on Data Engineering and Communications Technologies, pp. 161 - 172, http://dx.doi.org/10.1007/978-3-030-34986-8_11
,2018, 'Measuring and Analysing the Use of Ontologies A Semantic Framework for Measuring Ontology Usage', in , Springer
,2018, 'Closing the Loop: Placing Ontology Usage Analysis in the Ontology Development and Deployment Lifecycle', in Measuring and Analysing the Use of Ontologies, Springer, pp. 23 - 47, http://dx.doi.org/10.1007/978-3-319-75681-3_2
,2018, 'Cyber Security for Cyber Physical Systems', in CYBER SECURITY FOR CYBER PHYSICAL SYSTEMS, SPRINGER-VERLAG BERLIN, http://dx.doi.org/10.1007/978-3-319-75880-0
,2018, 'Cyber-physical systems security', in Cyber security for cyber physical systems, Springer, pp. 1 - 10, http://dx.doi.org/10.1007/978-3-319-75880-0_1
,2018, 'Distributed control systems security for CPS', in Cyber Security for Cyber Physical Systems, Springer, pp. 141 - 160, http://dx.doi.org/10.1007/978-3-319-75880-0_7
,2018, 'Embedded systems security for cyber-physical systems', in Cyber Security for Cyber Physical Systems, Springer, pp. 115 - 140, http://dx.doi.org/10.1007/978-3-319-75880-0_6
,2018, 'Evaluation of U Ontology', in Measuring and Analysing the Use of Ontologies, Springer, pp. 243 - 268, http://dx.doi.org/10.1007/978-3-319-75681-3_9
,2018, 'ICS/SCADA system security for CPS', in Cyber Security for Cyber Physical Systems, Springer, pp. 89 - 113, http://dx.doi.org/10.1007/978-3-319-75880-0_5
,2018, 'Identification Phase: Ontology Usage Network Analysis Framework (OUN-AF)', in Measuring and Analysing the Use of Ontologies, Springer, pp. 63 - 101, http://dx.doi.org/10.1007/978-3-319-75681-3_4
,2018, 'Investigation Phase: Empirical Analysis of Domain Ontology Usage (EMP-AF)', in Measuring and Analysing the Use of Ontologies. Studies in Computational Intelligence., Springer, Cham, pp. 103 - 140, http://dx.doi.org/10.1007/978-3-319-75681-3_5
,2018, 'Investigation Phase: Quantitative Analysis of Domain Ontology Usage (QUA-AF)', in Measuring and Analysing the Use of Ontologies. Studies in Computational Intelligence, Springer, Cham, pp. 141 - 169, http://dx.doi.org/10.1007/978-3-319-75681-3_6
,2018, 'Motivation', in Measuring and Analysing the Use of Ontologies, Springer, pp. 1 - 21, http://dx.doi.org/10.1007/978-3-319-75681-3_1
,2018, 'New Research Directions', in Measuring and Analysing the Use of Ontologies, Springer, pp. 269 - 271, http://dx.doi.org/10.1007/978-3-319-75681-3_10
,2018, 'Ontology Usage Analysis Framework (OUSAF)', in Measuring and Analysing the Use of Ontologies, Springer, pp. 49 - 62, http://dx.doi.org/10.1007/978-3-319-75681-3_3
,2018, 'Representation Phase: Ontology Usage Ontology (U Ontology)', in Measuring and Analysing the Use of Ontologies, Springer, pp. 171 - 203, http://dx.doi.org/10.1007/978-3-319-75681-3_7
,2018, 'Risk management for CPS security', in Cyber Security for Cyber Physical Systems, Springer, pp. 11 - 33, http://dx.doi.org/10.1007/978-3-319-75880-0_2
,2018, 'Standards for CPS', in Cyber Security for Cyber Physical Systems, Springer, pp. 161 - 174, http://dx.doi.org/10.1007/978-3-319-75880-0_8
,2018, 'Utilization Phase: Utilization of OUSAF', in Measuring and Analysing the Use of Ontologies, Springer, pp. 205 - 242, http://dx.doi.org/10.1007/978-3-319-75681-3_8
,2018, 'Wireless sensor network security for cyber-physical systems', in Cyber Security for Cyber Physical Systems, Springer, pp. 35 - 63, http://dx.doi.org/10.1007/978-3-319-75880-0_3
,2018, 'WSN security mechanisms for CPS', in Cyber security for cyber physical systems, Springer, pp. 65 - 87, http://dx.doi.org/10.1007/978-3-319-75880-0_4
,2013, 'Application of fuzzy inference systems in real world scenarios', in , pp. 101 - 107, http://dx.doi.org/10.1007/978-3-642-35641-4_16
,2012, 'Determining the Significance of Assessment Criteria for Risk Analysis in Business Associations', in Jain LC; Chee PL (ed.), Handbook on Decision Making: Reviews and applications of intelligent decision support systems
,2010, 'Cost-Benefit Analysis to Hedge with Third-Party Producers in Demand-Driven Production', in Xhafa F; Barolli L; Papajorgji PJ (ed.), Complex Intelligent Systems and Their Applications, Springer Verlag
,2008, 'Determining the failure level for risk analysis in an e-commerce interaction', in , pp. 290 - 323, http://dx.doi.org/10.1007/978-3-540-89784-2_12
,2007, 'Communicating Recommendations in a Service-Oriented Environment', in
,Journal articles
2024, 'Deep learning approaches to identify order status in a complex supply chain', Expert Systems with Applications, 250, http://dx.doi.org/10.1016/j.eswa.2024.123947
,2024, 'Adaptive identification of supply chain disruptions through reinforcement learning', Expert Systems with Applications, 248, pp. 123477, http://dx.doi.org/10.1016/j.eswa.2024.123477
,2024, 'Event Identification for Supply Chain Risk Management Through News Analysis by Using Large Language Models', The Review of Socionetwork Strategies, http://dx.doi.org/10.1007/s12626-024-00169-z
,2024, 'On Trust Recommendations in the Social Internet of Things - A Survey', ACM Computing Surveys, 56, pp. 1 - 35, http://dx.doi.org/10.1145/3645100
,2024, 'Reducing emissions from production and distribution in three-echelon supply chains', International Journal of Production Economics, 271, http://dx.doi.org/10.1016/j.ijpe.2024.109181
,2024, 'A rule-based method to effectively adopt robotic process automation', Journal of Software: Evolution and Process, http://dx.doi.org/10.1002/smr.2709
,2023, 'Reinforcement Learning-Based News Recommendation System', IEEE Transactions on Services Computing, 16, pp. 4493 - 4502, http://dx.doi.org/10.1109/TSC.2023.3326197
,2023, 'Blockchain-based multi-factor authentication: A systematic literature review', Internet of Things (Netherlands), 23, http://dx.doi.org/10.1016/j.iot.2023.100844
,2023, 'Data-driven personalized assortment optimization by considering customers’ value and their risk of churning: Case of online grocery shopping', Computers and Industrial Engineering, 182, http://dx.doi.org/10.1016/j.cie.2023.109328
,2023, 'An optimized Belief-Rule-Based (BRB) approach to ensure the trustworthiness of interpreted time-series decisions', Knowledge-Based Systems, 271, http://dx.doi.org/10.1016/j.knosys.2023.110552
,2023, 'SIAEF/PoE: Accountability of Earnestness for encoding subjective information in Blockchain', Knowledge-Based Systems, 269, pp. 110501, http://dx.doi.org/10.1016/j.knosys.2023.110501
,2023, 'Blockchain-based micro-credentialing system in higher education institutions: Systematic literature review', Knowledge-Based Systems, 265, http://dx.doi.org/10.1016/j.knosys.2022.110238
,2023, 'A systematic literature review on pharmaceutical supply chain: research gaps and future opportunities', International Journal of Web and Grid Services, 19, pp. 233 - 258, http://dx.doi.org/10.1504/IJWGS.2023.131243
,2023, 'Advanced deep learning approaches to predict supply chain risks under COVID-19 restrictions', Expert Systems with Applications, 211, http://dx.doi.org/10.1016/j.eswa.2022.118604
,2023, 'Interpreting the antecedents of a predicted output by capturing the interdependencies among the system features and their evolution over time', Engineering Applications of Artificial Intelligence, 117, http://dx.doi.org/10.1016/j.engappai.2022.105596
,2023, 'A systematic literature review on pharmaceutical supply chain: research gaps and future opportunities', International Journal of Web and Grid Services, 19, pp. 233 - 233, http://dx.doi.org/10.1504/ijwgs.2023.10056512
,2022, 'An end-to-end ranking system based on customers reviews: Integrating semantic mining and MCDM techniques', Expert Systems with Applications, 209, http://dx.doi.org/10.1016/j.eswa.2022.118294
,2022, 'Intelligent context-aware fog node discovery', Internet of Things (Netherlands), 20, http://dx.doi.org/10.1016/j.iot.2022.100607
,