Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security., , , , and . IEEE Access, (2022)Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection., , , and . IEEE Access, (2020)Automated security investment analysis of dynamic networks., , , , and . ACSW, page 6:1-6:10. ACM, (2018)Towards Automated Generation and Visualization of Hierarchical Attack Representation Models., , and . CIT/IUCC/DASC/PICom, page 1689-1696. IEEE, (2015)Security Modeling and Analysis of Cross-Protocol IoT Devices., , , and . TrustCom/BigDataSE/ICESS, page 1043-1048. IEEE Computer Society, (2017)Comprehensive Security Assessment of Combined MTD Techniques for the Cloud., , , and . MTD@CCS, page 11-20. ACM, (2018)ARGH!: Automated Rumor Generation Hub., , , , and . CIKM, page 3847-3856. ACM, (2021)A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking., , , , and . IEEE Access, (2019)Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems., , , and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 582-592. Springer, (2015)Entropy-based Selective Homomorphic Encryption for Smart Metering Systems., , , , and . PRDC, page 228-235. IEEE, (2023)