Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comprehensive Requirement Capturing Model Enabling the Automated Formalisation of NL Requirements., , , , and . SN Comput. Sci., 4 (1): 57 (2023)The Challenges of Leveraging Threat Intelligence to Stop Data Breaches., , , and . Frontiers Comput. Sci., (2020)Supporting automated software re-engineering using re-aspects., , and . ASE, page 230-233. ACM, (2012)RCM: Requirement Capturing Model for Automated Requirements Formalisation., , , , and . MODELSWARD, page 110-121. SCITEPRESS, (2021)Enhancing NL Requirements Formalisation Using a Quality Checking Model., , , , and . RE, page 448-449. IEEE, (2021)SMURF: Supporting Multi-tenancy Using Re-aspects Framework., , and . ICECCS, page 361-370. IEEE Computer Society, (2012)Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors., , and . ICECCS, page 70-79. IEEE Computer Society, (2015)Supporting automated vulnerability analysis using formalized vulnerability signatures., , and . ASE, page 100-109. ACM, (2012)VAM-aaS: Online Cloud Services Security Vulnerability Analysis and Mitigation-as-a-Service., , and . WISE, volume 7651 of Lecture Notes in Computer Science, page 411-425. Springer, (2012)Operating System Kernel Data Disambiguation to Support Security Analysis., , , and . NSS, volume 7645 of Lecture Notes in Computer Science, page 263-276. Springer, (2012)