From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Empirical Methodology to Evaluate Vulnerability Discovery Models., и . IEEE Trans. Software Eng., 40 (12): 1147-1162 (2014)Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard., , и . ER, том 2813 из Lecture Notes in Computer Science, стр. 263-276. Springer, (2003)EXPTIME tableaux for ALC., и . Artif. Intell., 124 (1): 87-138 (2000)Maintaining privacy on derived objects., , , и . WPES, стр. 10-19. ACM, (2005)How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach., , , , и . ICAIL, стр. 149-153. ACM, (2007)Privacy Is Linking Permission to Purpose., и . Security Protocols Workshop, том 3957 из Lecture Notes in Computer Science, стр. 179-191. Springer, (2004)Exptime Tableaux for ALC., , и . Description Logics, том WS-96-05 из AAAI Technical Report, стр. 107-110. AAAI Press, (1996)Diversity: A Poor Man's Solution to Drone Takeover., , и . PECCS, стр. 25-34. SciTePress, (2017)DES: a Challenge Problem for Nonmonotonic Reasoning Systems, , и . CoRR, (2000)Technical leverage analysis in the Python ecosystem., и . Empir. Softw. Eng., 28 (6): 139 (ноября 2023)