Author of the publication

A Two-Tier Technique for Supporting Quantifiers in a Lazily Proof-Explicating Theorem Prover.

, , and . TACAS, volume 3440 of Lecture Notes in Computer Science, page 334-348. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations., , , , , and . SOUPS, page 237-251. USENIX Association, (2016)Mission-oriented moving target defense based on cryptographically strong network dynamics., , , and . CSIIRW, page 57. ACM, (2013)Model-driven, Moving-Target Defense for Enterprise Network Security., , , and . Models@run.time@Dagstuhl, volume 8378 of Lecture Notes in Computer Science, page 137-161. Springer, (2011)Effective Network Vulnerability Assessment through Model Abstraction., , and . DIMVA, volume 6739 of Lecture Notes in Computer Science, page 17-34. Springer, (2011)Uncertainty and Risk Management in Cyber Situational Awareness., , and . Cyber Situational Awareness, volume 46 of Advances in Information Security, Springer, (2010)A Preliminary Study on Using Large Language Models in Software Pentesting., , , , , , , and . CoRR, (2024)A scalable approach to attack graph generation., , and . CCS, page 336-345. ACM, (2006)Improving Attack Graph Visualization through Data Reduction and Attack Grouping., , , and . VizSEC, volume 5210 of Lecture Notes in Computer Science, page 68-79. Springer, (2008)MTD 2017: Fourth ACM Workshop on Moving Target Defense (MTD)., and . CCS, page 2637-2638. ACM, (2017)An Analysis of the Role of Situated Learning in Starting a Security Culture in a Software Company., , , and . SOUPS @ USENIX Security Symposium, page 617-632. USENIX Association, (2021)