From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Requirements Engineering for Trust Management: Model, Methodology, and Reasoning, , , и . International Journal of Information Security, 5 (4): 257--274 (2006)TESTREX: a Testbed for Repeatable Exploits., , , и . CSET, USENIX Association, (2014)Attack Potential in Impact and Complexity., и . CoRR, (2018)Building Principles for Lawful Cyber Lethal Autonomous Weapons., и . IEEE Secur. Priv., 20 (2): 101-106 (2022)Technical Leverage: Dependencies Are a Mixed Blessing., и . IEEE Secur. Priv., 19 (3): 58-62 (2021)Guest Editorial: Special section on software reliability and security., , и . Inf. Softw. Technol., 54 (12): 1376 (2012)On the feasibility of detecting injections in malicious npm packages., , , и . ARES, стр. 115:1-115:8. ACM, (2022)A preliminary analysis of vulnerability scores for attacks in wild: the ekits and sym datasets., и . BADGERS@CCS, стр. 17-24. ACM, (2012)Goal-Equivalent Secure Business Process Re-engineering., , и . ICSOC Workshops, том 4907 из Lecture Notes in Computer Science, стр. 212-223. Springer, (2007)Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations., , , , и . ICSE, стр. 395. ACM, (2018)