From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Learning by Failing (and Fixing)., , , и . IEEE Secur. Priv., 6 (4): 54-56 (2008)Threat Representation Methods for Composite Service Process Models., и . Int. J. Secur. Softw. Eng., 4 (2): 1-18 (2013)CloudSurfer - A Cloud Broker Application for Security Concerns., , , , , , , и . CLOSER, стр. 199-206. SciTePress, (2013)An experimental evaluation of bow-tie analysis for security., , , , и . Inf. Comput. Secur., (2019)Evaluating the Impact of ChatGPT on Exercises of a Software Security Course., , , , и . ESEM, стр. 1-6. IEEE, (2023)Visualizing Cyber Security Risks with Bow-Tie Diagrams., , , , и . GraMSec@CSF, том 10744 из Lecture Notes in Computer Science, стр. 38-56. Springer, (2017)Protecting Future Maritime Communication., , и . ARES, стр. 97:1-97:10. ACM, (2017)The Aniketos Platform., , , и . Secure and Trustworthy Service Composition, том 8900 из Lecture Notes in Computer Science, Springer, (2014)Integrating and Validating Maritime Transport Security Services: Initial results from the CS4EU demonstrator., , , , , , , , и . IC3, стр. 371-377. ACM, (2021)Security Requirements Engineering for Secure Business Processes., , , и . BIR Workshops, том 106 из Lecture Notes in Business Information Processing, стр. 77-89. Springer, (2011)