Author of the publication

A Systematic Process-Model-based Approach for Synthesizing Attacks and Evaluating Them.

, , , , and . EVT/WOTE, USENIX Association, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What is software?. Autom. Softw. Eng., 15 (3-4): 261-273 (2008)Software processes are software too.. ISPW, page 79-80. IEEE Computer Society, (1986)Improving the quality of software quality determination processes.. Quality of Numerical Software, volume 76 of IFIP Conference Proceedings, page 90-105. Chapman & Hall, (1996)Software Processes Are Software Too.. ICSE, page 2-13. ACM Press, (1987)Impact Project Panel: Determining the Impact of Software Engineering Research Upon Practice.. ICSE, page 697. IEEE Computer Society, (2001)The Detection of Anomalous Interprocedural Data Flow., and . ICSE, page 624-628. IEEE Computer Society, (1976)Toward Objective, Systematic Design-Method Comparisons., and . IEEE Software, 9 (3): 43-53 (1992)Precise process definitions for activities of daily living: a basis for real-time monitoring and hazard detection., , , and . SEHC@ICSE, page 13-16. ACM, (2011)A Mechanism for Environment Integration., and . ACM Trans. Program. Lang. Syst., 12 (1): 1-25 (1990)AIDA: a dynamic analyser for Ada programs., , and . Inf. Softw. Technol., 36 (2): 107-117 (1994)