Author of the publication

Investigative Support for Information Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics.

, , and . FNC/MobiSPC, volume 34 of Procedia Computer Science, page 266-275. Elsevier, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Requirements Scenarios Based System-Testing., and . SEKE, page 252-257. (2004)An algebra of product families., , and . Softw. Syst. Model., 10 (2): 161-182 (2011)The prediction of mid-winter and spring breakups of ice cover on Canadian rivers using a hybrid ontology-based and machine learning model., , and . Environ. Model. Softw., (February 2023)A Formal Engineering Approach to Product Family Modeling., , and . TASE, page 87-94. IEEE, (2021)A Multidimensional Approach towards a Quantitative Assessment of Security Threats., , and . ANT/SEIT, volume 52 of Procedia Computer Science, page 507-514. Elsevier, (2015)Configuration and Governance of Dynamic Secure SDN., and . ANT/EDI40, volume 184 of Procedia Computer Science, page 131-139. Elsevier, (2021)A Tool for Formal Feature Modeling Based on BDDs and Product Families Algebra., and . WER, (2010)Defense in Depth Formulation and Usage in Dynamic Access Control., , and . POST, volume 10204 of Lecture Notes in Computer Science, page 253-274. Springer, (2017)A Framework for Multi-view Reconciliation and for Medical Devices Personalization., , , and . ICFEM, volume 10610 of Lecture Notes in Computer Science, page 71-87. Springer, (2017)On the weaving process of aspect-oriented product family algebra., and . J. Log. Algebraic Methods Program., 85 (1): 146-172 (2016)