Author of the publication

MDSE@R: Model-Driven Security Engineering at Runtime.

, , and . CSS, volume 7672 of Lecture Notes in Computer Science, page 279-295. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ontology-based automated support for goal-use case model analysis., , and . Softw. Qual. J., 24 (3): 635-673 (2016)Supporting operating system kernel data disambiguation using points-to analysis., , , and . ASE, page 234-237. ACM, (2012)Supporting Scientists in Re-engineering Sequential Programs to Parallel Using Model-Driven Engineering., and . SE4HPCS@ICSE, page 1-8. IEEE Computer Society, (2015)A suite of domain-specific visual languages for scientific software application modelling., , , , , and . VL/HCC, page 91-94. IEEE Computer Society, (2013)Operating System Kernel Data Disambiguation to Support Security Analysis., , , and . NSS, volume 7645 of Lecture Notes in Computer Science, page 263-276. Springer, (2012)Supporting automated vulnerability analysis using formalized vulnerability signatures., , and . ASE, page 100-109. ACM, (2012)VAM-aaS: Online Cloud Services Security Vulnerability Analysis and Mitigation-as-a-Service., , and . WISE, volume 7651 of Lecture Notes in Computer Science, page 411-425. Springer, (2012)MDSE@R: Model-Driven Security Engineering at Runtime., , and . CSS, volume 7672 of Lecture Notes in Computer Science, page 279-295. Springer, (2012)Automated software architecture security risk analysis using formalized signatures., , and . ICSE, page 662-671. IEEE Computer Society, (2013)GUITAR: An ontology-based automated requirements analysis tool., , and . RE, page 315-316. IEEE Computer Society, (2014)