Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A threat-driven approach to modeling and verifying secure software., and . ASE, page 342-346. ACM, (2005)Mining Executable Specifications of Web Applications from Selenium IDE Tests., , , and . SERE, page 263-272. IEEE, (2012)Logical object as a basis of knowledge based systems., and . J. Comput. Sci. Technol., 10 (5): 425-438 (1995)Generating Parallel Based on Planning Graph Analysis of Predicate/Transition Nets., , and . IC-AI, page 440-446. CSREA Press, (2002)Threat-Driven Architectural Design of Secure Information Systems., and . ICEIS (3), page 136-143. (2005)Effect of NO2 on O3 Using Complex Network Topology Analysis., , , and . IEEE Trans. Comput. Social Systems, 6 (6): 1329-1342 (2019)Secure System Modeling: Integrating Security Attacks with Statecharts., and . Int. J. Softw. Informatics, 6 (2): 271-306 (2012)A logic based language for networked agents.. Inf. Softw. Technol., 40 (8): 435-442 (1998)Automated Test Code Generation from UML Protocol State Machines., , and . SEKE, page 99-104. Knowledge Systems Institute Graduate School, (2007)Testing aspect-oriented programs with finite state machines., , , and . Softw. Test. Verification Reliab., 22 (4): 267-293 (2012)