Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Future forums: A methodology for exploring, gamifying, and raising security awareness of code-citizens., , , and . Int. J. Hum. Comput. Stud., (2023)Integrity Checking and Abnormality Detection of Provenance Records., , , and . TaPP, USENIX Association, (2020)Flexible graph matching and graph edit distance using answer set programming., and . CoRR, (2019)Introducing and Interfacing with Cybersecurity - A Cards Approach., , , , , , , and . CoRR, (2023)Checking Contact Tracing App Implementations with Bespoke Static Analysis., , , and . SN Comput. Sci., 3 (6): 496 (2022)Expressiveness Benchmarking for System-Level Provenance., , , , and . TaPP, USENIX Association, (2017)Provenance expressiveness benchmarking on non-deterministic executions., , and . TaPP, USENIX Association, (2021)Aligning a Serious Game, Secure Programming and CyBOK-Linked Learning Outcomes., , , and . EuroS&P Workshops, page 486-495. IEEE, (2022)Analysing system behaviour by automatic benchmarking of system-level provenance.. Middleware Doctoral Symposium, page 1-5. ACM, (2019)ProvMark: A Provenance Expressiveness Benchmarking System., , , , , , , and . Middleware, page 268-279. ACM, (2019)