Author of the publication

Software Security Investment: The Right Amount of a Good Thing.

, and . SecDev, page 53-59. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Architectural Strategies: An Approach for Achieving Various Levels of Privacy Protection., and . WPES@CCS, page 143-154. ACM, (2018)On the formal interpretation and behavioural consistency checking of SysML blocks., and . Softw. Syst. Model., 16 (4): 1145-1178 (2017)Towards Models for Privacy Preservation in the Face of Metadata Exploitation., and . Privacy and Identity Management, volume 619 of IFIP Advances in Information and Communication Technology, page 247-264. Springer, (2020)Multiobjective feature selection for microarray data via distributed parallel algorithms., , , , , , , , , and . Future Gener. Comput. Syst., (2019)On small-scale IT users' system architectures and cyber security: A UK case study., and . Comput. Secur., (2017)Creating curriculum connections: A university museum object-based learning project., , , , and . Educ. Inf., 34 (2): 113-120 (2018)Formal models for automotive systems and vehicular networks: Benefits and challenges., , and . VNC, page 1-8. IEEE, (2016)Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications., , , , and . UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld, page 414-422. IEEE Computer Society, (2016)Formal Models for Privacy., and . EDBT/ICDT Workshops, volume 1558 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)When the Winning Move is Not to Play: Games of Deterrence in Cyber Security., , and . GameSec, volume 9406 of Lecture Notes in Computer Science, page 250-269. Springer, (2015)