Author of the publication

Detecting insider threats in software systems using graph models of behavioral paths.

, , , , and . HotSoS, page 20:1-20:2. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Latency-Aware Self-Adaptation Using Stochastic Games and Simulations., , , and . ACM Trans. Auton. Adapt. Syst., 10 (4): 23:1-23:28 (2016)Software architecture: a travelogue.. FOSE, page 29-39. ACM, (2014)Architecture-based self-adaptation in the presence of multiple objectives., , and . SEAMS@ICSE, page 2-8. ACM, (2006)Documenting Software Architectures: Views and Beyond, , , , , , , , and . SEI Series in Software Engineering Addison-Wesley, Upper Saddle River, NJ, (2010)Modeling and Analysis of Explanation for Secure Industrial Control Systems., , , and . ACM Trans. Auton. Adapt. Syst., 17 (3-4): 1-26 (December 2022)Information Reuse and Stochastic Search: Managing Uncertainty in Self-* Systems., , and . ACM Trans. Auton. Adapt. Syst., 15 (1): 3:1-3:36 (2021)Explanations for human-on-the-loop: a probabilistic model checking approach., , , and . SEAMS@ICSE, page 181-187. ACM, (2020)Guest Editors' Introduction: 1999 International Conference on Software Engineering., , and . IEEE Trans. Software Eng., 27 (2): 97-98 (2001)Software Architecture.. Wiley Encyclopedia of Computer Science and Engineering, John Wiley & Sons, Inc., (2008)Building Long-Lived Adaptive Systems., , and . IEEE Software, 36 (2): 70-72 (2019)