Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Stable Variational Autoencoder for Text Modelling., , , , and . INLG, page 594-599. Association for Computational Linguistics, (2019)Semantics for structured systems modelling and simulation., , and . SimuTools, page 34. ICST/ACM, (2010)Errata for Formal Aspects of Computing (2006) 18: 495-517 and their consequences., , and . Formal Asp. Comput., 19 (4): 551-554 (2007)Bunched polymorphism., , and . Math. Struct. Comput. Sci., 18 (6): 1091-1132 (2008)A Quantitative Field Study of a Persuasive Security Technology in the Wild., , and . SocInfo, volume 13618 of Lecture Notes in Computer Science, page 211-232. Springer, (2022)Algebra and logic for access control., and . Formal Aspects Comput., 22 (2): 83-104 (2010)A Subjective Network Approach for Cybersecurity Risk Assessment., , and . SIN, page 1:1-1:8. ACM, (2020)Security Analysis Using Subjective Attack Trees., , and . SECITC, volume 12596 of Lecture Notes in Computer Science, page 288-301. Springer, (2020)Bunching for Regions and Locations., and . MFPS, volume 158 of Electronic Notes in Theoretical Computer Science, page 171-197. Elsevier, (2006)Exploring Susceptibility Measures to Persuasion., , and . PERSUASIVE, volume 12064 of Lecture Notes in Computer Science, page 16-29. Springer, (2020)