Author of the publication

A Cross-Domain Comparable Measurement Framework to Quantify Intrusion Detection Effectiveness.

, , and . CISRC, page 11:1-11:8. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifying Intervention Policies to Counter Infection Propagation over Networks: A Model Checking Approach., , , and . AAAI, page 1408-1414. AAAI Press, (2011)Automata-Based Verification of Security Requirements of Composite Web Services., , , and . ISSRE, page 348-357. IEEE Computer Society, (2010)Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring., , , and . DASC, page 333-340. IEEE Computer Society, (2006)MoSCoE: A Framework for Modeling Web Service Composition and Execution., , , and . ICDE Workshops, page 143. IEEE Computer Society, (2006)Compositional Analysis for Verification of Parameterized Systems., and . TACAS, volume 2619 of Lecture Notes in Computer Science, page 315-330. Springer, (2003)Selecting and Composing Web Services through Iterative Reformulation of Functional Specifications., , , and . ICTAI, page 445-454. IEEE Computer Society, (2006)iConSMutate: Concolic Testing of Database Applications Using Existing Database States Guided by SQL Mutants., , and . ITNG, page 479-484. IEEE Computer Society, (2014)Finite bisimulation of reactive untimed infinite state systems modeled as automata with variables., , and . ACC, page 1-6. IEEE, (2006)Multi-clock Soc design using protocol conversion., , , and . DATE, page 123-128. IEEE, (2009)SoC Design Approach Using Convertibility Verification., , and . EURASIP J. Embed. Syst., (2008)