Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing NFV Orchestration with Security Policies., and . ARES, page 45:1-45:6. ACM, (2018)Combining Risk Analysis and Security Testing., , , and . ISoLA (2), volume 8803 of Lecture Notes in Computer Science, page 322-336. Springer, (2014)Towards Executable UML Interactions based on fUML.. MODELSWARD, page 405-411. SciTePress, (2016)Abstractions on Test Design Techniques.. FedCSIS, volume 2 of Annals of Computer Science and Information Systems, page 1575-1584. (2014)Extending the UML Testing Profile with a Fine-Grained Test Logging Model., , , and . ICST Workshops, page 257-266. IEEE Computer Society, (2018)Execution of UTP test cases using fUML., and . MODELS Workshops, volume 2245 of CEUR Workshop Proceedings, page 245-250. CEUR-WS.org, (2018)MIDAS: Automated SOA Testing on the Cloud., , , and . ERCIM News, (2013)A Negative Input Space Complexity Metric as Selection Criterion for Fuzz Testing., , and . ICTSS, volume 9447 of Lecture Notes in Computer Science, page 257-262. Springer, (2015)Evolution of the UML Interactions Metamodel., , and . MoDELS, volume 8107 of Lecture Notes in Computer Science, page 405-421. Springer, (2013)Extending UTP 2 with cascading arbitration specifications., , and . A-TEST@ESEC/SIGSOFT FSE, page 8-14. ACM, (2019)