Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Self-Adaptation for Cyber-Defense - Pushing Adaptive Perimeter Protection Inward., , , , , , , , and . SASO Workshops, page 47-52. IEEE Computer Society, (2013)An Interaction Fit Analysis Technique and its Applications., , , and . AAAI Spring Symposia, AAAI Press, (2014)Self-Adaptation Metrics for Active Cybersecurity., , , , , and . SASO Workshops, page 53-58. IEEE Computer Society, (2013)Mining for Psycho-Social Dimensions through Sociolinguistics., , , , and . AAAI Spring Symposia, AAAI Press, (2015)Power and Politeness in Interactions: ADMIRE - A Tool for Deriving the Former from the Latter., and . SocialInformatics, page 177-184. IEEE Computer Society, (2012)Using Concolic Testing to Refine Vulnerability Profiles in FUZZBUSTER., , and . SASO Workshops, page 9-14. IEEE Computer Society, (2012)Automatic Self-Adaptation to Mitigate Software Vulnerabilities: A Fuzzbuster Progress Report (Extended Abstract for Poster)., , , , and . SASO, page 235-236. IEEE Computer Society, (2012)FUZZBUSTER: Towards Adaptive Immunity from Cyber Threats., , , , , and . SASO Workshops, page 137-140. IEEE Computer Society, (2011)Provenance-Based Interpretation of Multi-Agent Information Analysis., , , , , and . TaPP, USENIX Association, (2020)Non-intrusive detection of psycho-social dimensions using sociolinguistics., , , , and . ASONAM, page 1337-1344. ACM, (2013)