Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward risk-driven security measurement for Android smartphone platforms, , , , , and . Information Security for South Africa, 2013, page 1--8. IEEE, (2013)Security Measuring for Self-adaptive Security., , and . ECSA Workshops, page 5:1-5:7. ACM, (2014)A Tool for Security Measuring and Probe Management., , and . QRS Companion, page 1-6. IEEE, (2016)Mitigating IoT security threats with a trusted Network element., , , and . ICITST, page 260-265. IEEE, (2016)Situational Awareness for security adaptation in Industrial Control Systems., and . ICUFN, page 1-6. IEEE, (2015)The reliability estimation, prediction and measuring of component-based software., , and . J. Syst. Softw., 84 (6): 1054-1070 (2011)Context-aware systems and adaptive user authentication, and . Evolving Ambient Intelligence, Springer, (2013)Validation of the Reliability Analysis Method and Tool., and . SPLC (2), page 163-168. Lero Int. Science Centre, University of Limerick, Ireland, (2008)Architecture and Knowledge-Driven Self-Adaptive Security in Smart Space., , and . Computers, 2 (1): 34-66 (2013)Toward risk-driven security measurement for Android smartphone platforms., , , , , and . ISSA, page 1-8. IEEE, (2013)