Author of the publication

Toward Automatic Generation of Intrusion Detection Verification Rules.

, , and . ACSAC, page 279-288. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-objective Genetic Algorithm to Rank State-Based Test Cases., , and . SSBSE, volume 8084 of Lecture Notes in Computer Science, page 66-80. Springer, (2013)Change impact analysis for evolving configuration decisions in product line use case models., , , and . SST@ICSE, page 11. IEEE / ACM, (2019)Planning for Safety Standards Compliance: A Model-Based Tool-Supported Approach., , , , , and . IEEE Software, 29 (3): 64-70 (2012)Modeling robustness behavior using aspect-oriented modeling to support robustness testing of industrial systems., , and . Softw. Syst. Model., 11 (4): 633-670 (2012)Using machine learning to assist with the selection of security controls during security assessment., , , , , and . Empir. Softw. Eng., 25 (4): 2550-2582 (2020)Automated traceability analysis for UML model refinements, , and . Information and Software Technology, (2008)Replicated Case Studies for Investigating Quality Factors in Object-Oriented Designs., , and . Empirical Software Engineering, 6 (1): 11-58 (2001)Q-MOPP: qualitative evaluation of maintenance organizations, processes and products., , , , and . Journal of Software Maintenance, 10 (4): 249-278 (1998)A scalable approach for malware detection through bounded feature space behavior modeling., , , , and . ASE, page 312-322. IEEE, (2013)Embracing the Engineering Side of Software Engineering.. IEEE Software, 29 (4): 96 (2012)