Author of the publication

MDSE@R: Model-Driven Security Engineering at Runtime.

, , and . CSS, volume 7672 of Lecture Notes in Computer Science, page 279-295. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting operating system kernel data disambiguation using points-to analysis., , , and . ASE, page 234-237. ACM, (2012)Vision: mobile ehealth learning and intervention platform., , , and . MOBILESoft@ICSE, page 252-256. ACM, (2018)Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors., , and . ICECCS, page 70-79. IEEE Computer Society, (2015)SMURF: Supporting Multi-tenancy Using Re-aspects Framework., , and . ICECCS, page 361-370. IEEE Computer Society, (2012)Supporting automated software re-engineering using re-aspects., , and . ASE, page 230-233. ACM, (2012)The Challenges of Leveraging Threat Intelligence to Stop Data Breaches., , , and . Frontiers Comput. Sci., (2020)MDSE@R: Model-Driven Security Engineering at Runtime., , and . CSS, volume 7672 of Lecture Notes in Computer Science, page 279-295. Springer, (2012)Automated software architecture security risk analysis using formalized signatures., , and . ICSE, page 662-671. IEEE Computer Society, (2013)Supporting automated vulnerability analysis using formalized vulnerability signatures., , and . ASE, page 100-109. ACM, (2012)VAM-aaS: Online Cloud Services Security Vulnerability Analysis and Mitigation-as-a-Service., , and . WISE, volume 7651 of Lecture Notes in Computer Science, page 411-425. Springer, (2012)