Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy and Access Control for IHE-Based Systems., , , , , and . eHealth, volume 1 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 145-153. Springer, (2008)Detecting Malicious Windows Commands Using Natural Language Processing Techniques., and . SecITC, volume 11359 of Lecture Notes in Computer Science, page 157-169. Springer, (2018)Security Test Generation by Answer Set Programming., , , and . SERE, page 88-97. IEEE, (2014)Considering privacy and effectiveness of authorization policies for shared electronic health records., , , , and . IHI, page 553-562. ACM, (2012)A quantitative framework for security assurance evaluation and selection of cloud services: a case study., , and . Int. J. Inf. Sec., 22 (6): 1621-1650 (December 2023)Managing Privacy and Effectiveness of Patient-Administered Authorization Policies., , , , and . Int. J. Comput. Model. Algorithms Medicine, 3 (2): 43-62 (2012)Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain., and . XAILA@JURIX, volume 2381 of CEUR Workshop Proceedings, page 33-41. CEUR-WS.org, (2018)Towards a Model- and Learning-Based Framework for Security Anomaly Detection., , , and . FMCO, volume 7542 of Lecture Notes in Computer Science, page 150-168. Springer, (2011)Difficult XSS Code Patterns for Static Code Analysis Tools., , and . IOSec/MSTEC/FINSEC@ESORICS, volume 11981 of Lecture Notes in Computer Science, page 123-139. Springer, (2019)Automatic and Realistic Traffic Generation In A Cyber Range., , , , and . FiCloud, page 352-358. IEEE, (2023)