Author of the publication

The Design and Implementation of a Cryptographic Education Tool.

, , , and . CSEDU (1), page 193-198. SciTePress, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks., , and . IRI, page 73-78. IEEE Systems, Man, and Cybernetics Society, (2007)Using a Practice Oriented Approach to Teach Web Security Course., , , , and . FECS, page 405-409. CSREA Press, (2009)Interactive Code Annotation for Security Vulnerability Detection., , , and . SIW@CCS, page 17-22. ACM, (2014)What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool., , , , and . WSIW@SOUPS, USENIX Association, (2016)Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code., , and . SACMAT, page 73-80. ACM, (2016)Interactive support for secure programming education., , and . SIGCSE, page 687-692. ACM, (2013)Evaluating Two Methods for Integrating Secure Programming Education., , , and . SIGCSE, page 390-395. ACM, (2018)Learning APT chains from cyber threat intelligence., , , and . HotSoS, page 19:1-19:2. ACM, (2019)Idea: Interactive Support for Secure Software Development., , and . ESSoS, volume 6542 of Lecture Notes in Computer Science, page 248-255. Springer, (2011)SIW 2014: First Workshop on Security Information Workers., , , and . ACM Conference on Computer and Communications Security, page 1554. ACM, (2014)