Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of Secure M2M Communication in WSNs Using DTLS., , and . ICDCS Workshops, page 78-83. IEEE Computer Society, (2016)Different Approaches to Protocol and Service Testing.. IWTCS, volume 147 of IFIP Conference Proceedings, page 3-18. Kluwer, (1999)A modal based verification for LOTOS., and . FORTE, volume 6 of IFIP Conference Proceedings, page 215-217. Chapman & Hall, (1994)A Study of Threat Detection Systems and Techniques in the Cloud., , and . CRiSIS, volume 10694 of Lecture Notes in Computer Science, page 140-155. Springer, (2017)Special issue on formal active and passive testing of distributed and networked systems., , and . Ann. des Télécommunications, 70 (3-4): 83-84 (2015)Design of a Secure Shield for Internet and Web-Based Services Using Software Reflection., , , , and . ICWS, volume 10966 of Lecture Notes in Computer Science, page 472-486. Springer, (2018)HTTP/2 Attacks Generation using 5Greplay., , , , and . ARES, page 138:1-138:7. ACM, (2023)A GSM-MAP Protocol Experiment Using Passive Testing., , and . World Congress on Formal Methods, volume 1708 of Lecture Notes in Computer Science, page 915-934. Springer, (1999)Formal Verification of Coordination Systems' Requirements - A Case Study on the European Train Control System., and . SEKE, page 393-396. Knowledge Systems Institute Graduate School, (2014)SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks., , , , , , , , , and 5 other author(s). ARES, page 108:1-108:10. ACM, (2021)