From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Novel Approach for Attack Tree to Attack Graph Transformation., и . CRiSIS, том 13204 из Lecture Notes in Computer Science, стр. 74-90. Springer, (2021)You cannot improve what you do not measure: A triangulation study of software security metrics., и . SAC, стр. 1223-1232. ACM, (2024)Position: The Explainability Paradox - Challenges for XAI in Malware Detection and Analysis., и . EuroS&P Workshops, стр. 554-561. IEEE, (2024)An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects., , и . CSP Forum, том 470 из Communications in Computer and Information Science, стр. 159-170. Springer, (2014)New Directions in Attack Tree Research: Catching up with Industrial Needs., и . GraMSec@CSF, том 10744 из Lecture Notes in Computer Science, стр. 115-126. Springer, (2017)Towards Empirical Evaluation of Automated Risk Assessment Methods., , и . CRiSIS, том 10158 из Lecture Notes in Computer Science, стр. 77-86. Springer, (2016)Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract., и . FMCO, том 7866 из Lecture Notes in Computer Science, стр. 197-215. Springer, (2012)Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees., , , , и . GraMSec@CSF, том 9987 из Lecture Notes in Computer Science, стр. 80-93. Springer, (2016)Attack-Tree Series: A Case for Dynamic Attack Tree Analysis., и . GraMSec@CSF, том 11720 из Lecture Notes in Computer Science, стр. 7-19. Springer, (2019)An Effective Android Code Coverage Tool., , , , и . CCS, стр. 2189-2191. ACM, (2018)