From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Poster: protecting information in systems of systems., , и . ACM Conference on Computer and Communications Security, стр. 865-868. ACM, (2011)A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities., , и . Requir. Eng., 15 (1): 41-62 (2010)Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology., , и . Advances in Intelligent Information Systems, том 265 из Studies in Computational Intelligence, Springer, (2010)The POLIPO Security Framework., , , и . Situation Awareness with Systems of Systems, Springer, (2013)Privacy Analysis of User Behavior Using Alignments., , и . it Inf. Technol., 55 (6): 255-260 (2013)How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns., , , , и . Artif. Intell. Law, 17 (1): 1-30 (2009)A Policy Framework for Data Fusion and Derived Data Control., и . ABAC@CODASPY, стр. 47-57. ACM, (2016)PICO: privacy-preserving access control in IoT scenarios through incomplete information., и . SAC, стр. 147-156. ACM, (2022)HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems., , , , , и . ARES, стр. 113:1-113:10. ACM, (2023)Formal Analysis of BPMN Via a Translation into COWS., , и . COORDINATION, том 5052 из Lecture Notes in Computer Science, стр. 249-263. Springer, (2008)