Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attack graph generation for microservice architecture., , and . SAC, page 1235-1242. ACM, (2019)StIns4CS: A State Inspection Tool for C#., and . SPRO@CCS, page 61-71. ACM, (2016)Efficiently Checking Actual Causality with SAT Solving., , and . CoRR, (2019)Actual Causality Canvas: A General Framework for Explanation-Based Socio-Technical Constructs., , , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 2978-2985. IOS Press, (2020)Practical Causal Models for Cyber-Physical Systems., , , , and . NFM, volume 11460 of Lecture Notes in Computer Science, page 211-227. Springer, (2019)Requirements Reconciliation for Scalable and Secure Microservice (De)composition., and . RE Workshops, page 68-73. IEEE Computer Society, (2016)Extending Causal Models from Machines into Humans., , , , and . CREST@ETAPS, volume 308 of EPTCS, page 17-31. (2019)Taxonomy-as-a-Service: How To Structure Your Related Work., , and . CoRR, (2019)Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks., , , , and . GraMSec@CSF, volume 12419 of Lecture Notes in Computer Science, page 3-23. Springer, (2020)From Checking to Inference: Actual Causality Computations as Optimization Problems., and . ATVA, volume 12302 of Lecture Notes in Computer Science, page 343-359. Springer, (2020)