Author of the publication

XRound: A reversible template language and its application in model-based security analysis.

, and . Inf. Softw. Technol., 51 (5): 876-893 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimising unicode regular expression evaluation with previews.. Softw. Pract. Exp., 47 (5): 669-688 (2017)Trust Without Identification.. SPC, volume 3934 of Lecture Notes in Computer Science, page 1-2. Springer, (2006)Private browsing: A window of forensic opportunity.. Digital Investigation, 11 (1): 20-29 (2014)Security Planning and Refactoring in Extreme Programming., , , and . XP, volume 4044 of Lecture Notes in Computer Science, page 154-163. Springer, (2006)Control consistency as a management tool: the identification of systematic security control weaknesses in air traffic management.. Int. J. Crit. Comput. Based Syst., 6 (3): 229-245 (2016)Scoping the Cyber Security Body of Knowledge., , , , , , and . IEEE Secur. Priv., 16 (3): 96-102 (2018)Information Modeling for Automated Risk Analysis.. Communications and Multimedia Security, volume 4237 of Lecture Notes in Computer Science, page 228-239. Springer, (2006)Detecting Hidden Encrypted Volumes., and . Communications and Multimedia Security, volume 6109 of Lecture Notes in Computer Science, page 233-244. Springer, (2010)CyBOK: The Cyber Security Body of Knowledge, , , , and . , 1.0. The National Cyber Security Centre, UK, (October 2019)Specifying Information-Flow Controls., and . ICDCS Workshops, page 114-120. IEEE Computer Society, (2005)