From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Comprehensive Requirement Capturing Model Enabling the Automated Formalisation of NL Requirements., , , , и . SN Comput. Sci., 4 (1): 57 (2023)The Challenges of Leveraging Threat Intelligence to Stop Data Breaches., , , и . Frontiers Comput. Sci., (2020)Supporting automated software re-engineering using re-aspects., , и . ASE, стр. 230-233. ACM, (2012)RCM: Requirement Capturing Model for Automated Requirements Formalisation., , , , и . MODELSWARD, стр. 110-121. SCITEPRESS, (2021)Enhancing NL Requirements Formalisation Using a Quality Checking Model., , , , и . RE, стр. 448-449. IEEE, (2021)SMURF: Supporting Multi-tenancy Using Re-aspects Framework., , и . ICECCS, стр. 361-370. IEEE Computer Society, (2012)Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors., , и . ICECCS, стр. 70-79. IEEE Computer Society, (2015)Supporting automated vulnerability analysis using formalized vulnerability signatures., , и . ASE, стр. 100-109. ACM, (2012)VAM-aaS: Online Cloud Services Security Vulnerability Analysis and Mitigation-as-a-Service., , и . WISE, том 7651 из Lecture Notes in Computer Science, стр. 411-425. Springer, (2012)Operating System Kernel Data Disambiguation to Support Security Analysis., , , и . NSS, том 7645 из Lecture Notes in Computer Science, стр. 263-276. Springer, (2012)