Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards extended safety in connected vehicles., , , and . ITSC, page 652-657. IEEE, (2013)EPICS: A Framework for Enforcing Security Policies in Composite Web Services., , , and . IEEE Trans. Serv. Comput., 12 (3): 415-428 (2019)Detection of Message Injection Attacks onto the CAN Bus using Similarity of Successive Messages-Sequence Graphs., , , and . CoRR, (2021)Making Secure Software Insecure without Changing Its Code: The Possibilities and Impacts of Attacks on the DevOps Pipeline., , and . CoRR, (2022)Using Garbled Circuit for Secure Brokering., and . CRiSIS, volume 13204 of Lecture Notes in Computer Science, page 108-117. Springer, (2021)The pervasive trust foundation for security in next generation networks., , and . NSPW, page 129-142. ACM, (2010)A time-evolution model for the privacy degree of information disseminated in online social networks., , , and . Int. J. Commun. Networks Distributed Syst., 11 (4): 412-430 (2013)The current practices of changing secure software: an empirical study., , , , and . SAC, page 1566-1575. ACM, (2020)Extending the Agile Development Process to Develop Acceptably Secure Software., , , and . IEEE Trans. Dependable Secur. Comput., 11 (6): 497-509 (2014)Detection of Message Injection Attacks Onto the CAN Bus Using Similarities of Successive Messages-Sequence Graphs., , , and . IEEE Trans. Inf. Forensics Secur., (2021)