Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A formal verification of mutation-based moving target defense., , and . HotSoS, page 10:1-10:2. ACM, (2019)Formal verification of internal block diagram of SysML for modeling real-time system., , and . SNPD, page 617-622. IEEE Computer Society, (2015)AI Ethics in Healthcare - A Survey., , , , and . QRS Companion, page 826-833. IEEE, (2023)A Formal Analysis of Moving Target Defense., , and . COMPSAC, page 1802-1807. IEEE, (2020)Using Deep Reinforcement Learning And Formal Verification in Safety Critical Systems: Strategies and Challenges., , , , and . QRS Companion, page 834-842. IEEE, (2023)Email Address Mutation for Proactive Deterrence Against Lateral Spear-Phishing Attacks., , and . SecureComm (1), volume 335 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-22. Springer, (2020)Formal Verification of Time Constrains SysML Internal Block Diagram Using PRISM., , and . ICCSA (Short Papers/poster papers/PhD student showcase works), page 62-66. IEEE Computer Society, (2015)A Formal Verification of Configuration-Based Mutation Techniques for Moving Target Defense., , and . SecureComm (1), volume 335 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 61-79. Springer, (2020)Non-fungible Tokens and Their Applications., , , , and . WorldCIST (4), volume 802 of Lecture Notes in Networks and Systems, page 288-296. Springer, (2023)Formal Modeling and Verification of Industrial Robotic Arm - A Case Study., , , and . QRS Companion, page 499-508. IEEE, (2023)