Select Publications
Book Chapters
2024, 'A biological data-driven mining technique by using hybrid classifiers with rough set', in Research Anthology on Bioinformatics, Genomics, and Computational Biology, pp. 1 - 20, http://dx.doi.org/10.4018/979-8-3693-3026-5.ch001
,2020, 'A Customer-Oriented Assortment Selection in the Big Data Environment', in Lecture Notes on Data Engineering and Communications Technologies, pp. 161 - 172, http://dx.doi.org/10.1007/978-3-030-34986-8_11
,2018, 'Measuring and Analysing the Use of Ontologies A Semantic Framework for Measuring Ontology Usage', in , Springer
,2018, 'Closing the Loop: Placing Ontology Usage Analysis in the Ontology Development and Deployment Lifecycle', in Measuring and Analysing the Use of Ontologies, Springer, pp. 23 - 47, http://dx.doi.org/10.1007/978-3-319-75681-3_2
,2018, 'Cyber Security for Cyber Physical Systems', in CYBER SECURITY FOR CYBER PHYSICAL SYSTEMS, SPRINGER-VERLAG BERLIN, http://dx.doi.org/10.1007/978-3-319-75880-0
,2018, 'Cyber-physical systems security', in Cyber security for cyber physical systems, Springer, pp. 1 - 10, http://dx.doi.org/10.1007/978-3-319-75880-0_1
,2018, 'Distributed control systems security for CPS', in Cyber Security for Cyber Physical Systems, Springer, pp. 141 - 160, http://dx.doi.org/10.1007/978-3-319-75880-0_7
,2018, 'Embedded systems security for cyber-physical systems', in Cyber Security for Cyber Physical Systems, Springer, pp. 115 - 140, http://dx.doi.org/10.1007/978-3-319-75880-0_6
,2018, 'Evaluation of U Ontology', in Measuring and Analysing the Use of Ontologies, Springer, pp. 243 - 268, http://dx.doi.org/10.1007/978-3-319-75681-3_9
,2018, 'ICS/SCADA system security for CPS', in Cyber Security for Cyber Physical Systems, Springer, pp. 89 - 113, http://dx.doi.org/10.1007/978-3-319-75880-0_5
,2018, 'Identification Phase: Ontology Usage Network Analysis Framework (OUN-AF)', in Measuring and Analysing the Use of Ontologies, Springer, pp. 63 - 101, http://dx.doi.org/10.1007/978-3-319-75681-3_4
,2018, 'Investigation Phase: Empirical Analysis of Domain Ontology Usage (EMP-AF)', in Measuring and Analysing the Use of Ontologies. Studies in Computational Intelligence., Springer, Cham, pp. 103 - 140, http://dx.doi.org/10.1007/978-3-319-75681-3_5
,2018, 'Investigation Phase: Quantitative Analysis of Domain Ontology Usage (QUA-AF)', in Measuring and Analysing the Use of Ontologies. Studies in Computational Intelligence, Springer, Cham, pp. 141 - 169, http://dx.doi.org/10.1007/978-3-319-75681-3_6
,2018, 'Motivation', in Measuring and Analysing the Use of Ontologies, Springer, pp. 1 - 21, http://dx.doi.org/10.1007/978-3-319-75681-3_1
,2018, 'New Research Directions', in Measuring and Analysing the Use of Ontologies, Springer, pp. 269 - 271, http://dx.doi.org/10.1007/978-3-319-75681-3_10
,2018, 'Ontology Usage Analysis Framework (OUSAF)', in Measuring and Analysing the Use of Ontologies, Springer, pp. 49 - 62, http://dx.doi.org/10.1007/978-3-319-75681-3_3
,2018, 'Representation Phase: Ontology Usage Ontology (U Ontology)', in Measuring and Analysing the Use of Ontologies, Springer, pp. 171 - 203, http://dx.doi.org/10.1007/978-3-319-75681-3_7
,2018, 'Risk management for CPS security', in Cyber Security for Cyber Physical Systems, Springer, pp. 11 - 33, http://dx.doi.org/10.1007/978-3-319-75880-0_2
,2018, 'Standards for CPS', in Cyber Security for Cyber Physical Systems, Springer, pp. 161 - 174, http://dx.doi.org/10.1007/978-3-319-75880-0_8
,2018, 'Utilization Phase: Utilization of OUSAF', in Measuring and Analysing the Use of Ontologies, Springer, pp. 205 - 242, http://dx.doi.org/10.1007/978-3-319-75681-3_8
,2018, 'Wireless sensor network security for cyber-physical systems', in Cyber Security for Cyber Physical Systems, Springer, pp. 35 - 63, http://dx.doi.org/10.1007/978-3-319-75880-0_3
,2018, 'WSN security mechanisms for CPS', in Cyber security for cyber physical systems, Springer, pp. 65 - 87, http://dx.doi.org/10.1007/978-3-319-75880-0_4
,2013, 'Application of fuzzy inference systems in real world scenarios', in , pp. 101 - 107, http://dx.doi.org/10.1007/978-3-642-35641-4_16
,2012, 'Determining the Significance of Assessment Criteria for Risk Analysis in Business Associations', in Jain LC; Chee PL (ed.), Handbook on Decision Making: Reviews and applications of intelligent decision support systems
,2010, 'Cost-Benefit Analysis to Hedge with Third-Party Producers in Demand-Driven Production', in Xhafa F; Barolli L; Papajorgji PJ (ed.), Complex Intelligent Systems and Their Applications, Springer Verlag
,2008, 'Determining the failure level for risk analysis in an e-commerce interaction', in , pp. 290 - 323, http://dx.doi.org/10.1007/978-3-540-89784-2_12
,2007, 'Communicating Recommendations in a Service-Oriented Environment', in
,