Author of the publication

Model-Driven, Network-Context Sensitive Intrusion Detection.

, , , and . MoDELS, volume 4735 of Lecture Notes in Computer Science, page 61-75. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model-Driven, Network-Context Sensitive Intrusion Detection., , , and . MoDELS, volume 4735 of Lecture Notes in Computer Science, page 61-75. Springer, (2007)A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems., , and . MoDELS, volume 5795 of Lecture Notes in Computer Science, page 47-61. Springer, (2009)A Multi-objective Genetic Algorithm to Rank State-Based Test Cases., , and . SSBSE, volume 8084 of Lecture Notes in Computer Science, page 66-80. Springer, (2013)Change impact analysis for evolving configuration decisions in product line use case models., , , and . SST@ICSE, page 11. IEEE / ACM, (2019)Planning for Safety Standards Compliance: A Model-Based Tool-Supported Approach., , , , , and . IEEE Software, 29 (3): 64-70 (2012)Q-MOPP: qualitative evaluation of maintenance organizations, processes and products., , , , and . Journal of Software Maintenance, 10 (4): 249-278 (1998)Replicated Case Studies for Investigating Quality Factors in Object-Oriented Designs., , and . Empirical Software Engineering, 6 (1): 11-58 (2001)A scalable approach for malware detection through bounded feature space behavior modeling., , , , and . ASE, page 312-322. IEEE, (2013)Property-Based Software Engineering Measurement., , and . IEEE Trans. Software Eng., 22 (1): 68-86 (1996)A Realistic Empirical Evaluation of the Costs and Benefits of UML in Software Maintenance., , and . IEEE Trans. Software Eng., 34 (3): 407-432 (2008)