Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of Data Preparation on the Fairness of Software Systems., , and . ISSRE, page 391-401. IEEE, (2019)Software Testing Strategies for Detecting Hypercall Handlers' Aging-related Bugs., , , , , and . ISSRE Workshops, page 48-55. IEEE, (2021)Towards a Robustness Assessment Methodology for IoT Systems., , and . LADC, page 1-4. IEEE, (2021)HInjector: Injecting Hypercall Attacks for Evaluating VMI-based Intrusion Detection Systems, , , , and . The 2013 Annual Computer Security Applications Conference (ACSAC 2013), Maryland, USA, Applied Computer Security Associates (ACSA), (March 2013)OIDC-TCI: OIDC with Trust Context Information., , and . WMNC, page 54-61. IEEE, (2022)On Applying FMEA to SOAs: A Proposal and Open Challenges., , and . SERENE, volume 8785 of Lecture Notes in Computer Science, page 86-100. Springer, (2014)A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate., , , , and . MedComNet, page 1-8. IEEE, (2020)Detecting Vulnerabilities in Service Oriented Architectures., and . ISSRE Workshops, page 134-139. IEEE Computer Society, (2012)SOA-Scanner: An Integrated Tool to Detect Vulnerabilities in Service-Based Infrastructures., and . IEEE SCC, page 280-287. IEEE Computer Society, (2013)Evaluating and Improving Penetration Testing in Web Services., and . ISSRE, page 201-210. IEEE Computer Society, (2012)