Author of the publication

Using machine learning to assist with the selection of security controls during security assessment.

, , , , , and . Empir. Softw. Eng., 25 (4): 2550-2582 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Response to: Comments on "Property-Based Software Engineering Measurement: Refining the Additivity Properties"., , and . IEEE Trans. Software Eng., 23 (3): 196-197 (1997)Facilitating the transition from use case models to analysis models: Approach and experiments., , and . ACM Trans. Softw. Eng. Methodol., 22 (1): 5:1-5:38 (2013)How Reuse Influences Productivity in Object-Oriented Systems., , and . Commun. ACM, 39 (10): 104-116 (1996)A replicated assessment and comparison of common software cost modeling techniques., , and . ICSE, page 377-386. ACM, (2000)Enabling the runtime assertion checking of concurrent contracts for the Java modeling language., , and . ICSE, page 786-795. ACM, (2011)A systematic review of transformation approaches between user requirements and analysis models., , and . Requir. Eng., 16 (2): 75-99 (2011)Model-Driven, Network-Context Sensitive Intrusion Detection., , , and . MoDELS, volume 4735 of Lecture Notes in Computer Science, page 61-75. Springer, (2007)A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems., , and . MoDELS, volume 5795 of Lecture Notes in Computer Science, page 47-61. Springer, (2009)A Multi-objective Genetic Algorithm to Rank State-Based Test Cases., , and . SSBSE, volume 8084 of Lecture Notes in Computer Science, page 66-80. Springer, (2013)Planning for Safety Standards Compliance: A Model-Based Tool-Supported Approach., , , , , and . IEEE Software, 29 (3): 64-70 (2012)