Author of the publication

MetaSEnD: A Security Enabled Development Life Cycle Meta-Model.

, , and . ARES, page 152:1-152:10. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cloud SecDevOps Methodology: From Design to Testing., , , and . QUATIC, volume 1266 of Communications in Computer and Information Science, page 317-331. Springer, (2020)Evaluation of Driver Drowsiness based on Real-Time Face Analysis., , , and . SMC, page 328-335. IEEE, (2020)Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testing., , and . CSR, page 249-254. IEEE, (2021)Threat Modeling based Penetration Testing: The Open Energy Monitor Case study., , and . SIN, page 8:1-8:8. ACM, (2020)Automated Threat Modeling Approaches: Comparison of Open Source Tools., , and . QUATIC, volume 1621 of Communications in Computer and Information Science, page 250-265. Springer, (2022)GDPR compliance through standard security controls: An automated approach., , , , and . J. High Speed Networks, 30 (2): 147-174 (2024)A (in)Secure-by-Design IoT Protocol: the ESP Touch Protocol and a Case Study Analysis from the Real Market., and . CPSIOTSEC@CCS, page 37-48. ACM, (2020)Security in IoT Pairing & Authentication protocols, a Threat Model, a Case Study Analysis., , , and . ITASEC, volume 2940 of CEUR Workshop Proceedings, page 207-218. CEUR-WS.org, (2021)MetaSEnD: A Security Enabled Development Life Cycle Meta-Model., , and . ARES, page 152:1-152:10. ACM, (2022)Risk Analysis Automation Process in IT Security for Cloud Applications., , and . CLOSER (Selected Papers), volume 1607 of Communications in Computer and Information Science, page 47-68. Springer, (2021)