Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scoping the Cyber Security Body of Knowledge., , , , , , and . IEEE Secur. Priv., 16 (3): 96-102 (2018)EA-tracer: identifying traceability links between code aspects and early aspects., , , and . SAC, page 1035-1042. ACM, (2012)μ-DSU: A Micro-Language Based Approach to Dynamic Software Updating., , , and . Comput. Lang. Syst. Struct., (2018)Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers., , , , , and . Softw. Pract. Exp., 50 (3): 275-298 (2020)When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures?, , and . Big Data Soc., 9 (1): 205395172211083 (January 2022)Special issue on Early aspects: aspect-oriented requirements engineering and architecture design., , and . IEE Proc. Softw., 151 (4): 153-156 (2004)"So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber Security Decision Making., , , , , and . ACM Trans. Priv. Secur., 24 (1): 5:1-5:29 (2020)The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers., , , and . IEEE Trans. Software Eng., 48 (2): 364-376 (2022)The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game., , , , and . IEEE Trans. Software Eng., 45 (5): 521-536 (2019)Evaluation for Evolution: How Well Commercial Systems Do., and . ECOOP Workshops, volume 1743 of Lecture Notes in Computer Science, page 210-211. Springer, (1999)