Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Une expérience d'intégration d'une architecture à base de composants., , and . CAL, page 132-140. Hermes Science, (2006)A delegation-based approach for the unanticipated dynamic evolution of distributed objects., and . J. Syst. Softw., 82 (6): 932-946 (2009)Asset-Oriented Threat Modeling., , , , , and . TrustCom, page 491-501. IEEE, (2020)Recovering Software Architecture Product Lines., , , and . ICECCS, page 226-235. IEEE, (2019)Using Architectural Patterns to Define Architectural Decisions., , and . WICSA/ECSA, page 196-200. IEEE, (2012)Restructuring Object-Oriented Applications into Component-Oriented Applications by Using Consistency with Execution Traces., , , and . CBSE, volume 6092 of Lecture Notes in Computer Science, page 216-231. Springer, (2010)Architecture des IHM., , and . CAL, volume L-4 of Revue des Nouvelles Technologies de l'Information, page 17-32. Cépaduès-Éditions, (2009)Using the architecture of Socio-Technical System to analyse its vulnerability., , , , and . SoSE, page 361-366. IEEE, (2022)Security Analysis of IoT Systems Using Attack Trees., , , and . GraMSec@CSF, volume 11720 of Lecture Notes in Computer Science, page 68-94. Springer, (2019)Designing a Code Vulnerability Meta-scanner., , , and . ISPEC, volume 11879 of Lecture Notes in Computer Science, page 194-210. Springer, (2019)