Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting automated software re-engineering using re-aspects., , and . ASE, page 230-233. ACM, (2012)A Comprehensive Requirement Capturing Model Enabling the Automated Formalisation of NL Requirements., , , , and . SN Comput. Sci., 4 (1): 57 (2023)The Challenges of Leveraging Threat Intelligence to Stop Data Breaches., , , and . Frontiers Comput. Sci., (2020)RCM: Requirement Capturing Model for Automated Requirements Formalisation., , , , and . MODELSWARD, page 110-121. SCITEPRESS, (2021)Enhancing NL Requirements Formalisation Using a Quality Checking Model., , , , and . RE, page 448-449. IEEE, (2021)Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors., , and . ICECCS, page 70-79. IEEE Computer Society, (2015)SMURF: Supporting Multi-tenancy Using Re-aspects Framework., , and . ICECCS, page 361-370. IEEE Computer Society, (2012)CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model., , , and . NSS, page 113-120. IEEE, (2011)Towards Self-securing Software Systems., , and . Software Engineering for Variability Intensive Systems, Auerbach Publications / Taylor & Francis, (2019)TOSSMA: A Tenant-Oriented SaaS Security Management Architecture., , and . IEEE CLOUD, page 981-988. IEEE Computer Society, (2012)