Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT forensic analysis: A family of experiments with Amazon Echo devices., , , , and . Forensic Sci. Int. Digit. Investig., (June 2023)UML Consistency Rules: a Case Study with Open-Source UML Models., , , , and . FormaliSE@ICSE, page 130-140. ACM, (2020)On validating UML consistency rules.. ISSRE Workshops, page 59-60. IEEE Computer Society, (2015)How Sustainable are Model Software Artifacts in the Context of Model Driven Software Engineering., and . MeGSuS@ESEM, volume 1708 of CEUR Workshop Proceedings, page 43-52. CEUR-WS.org, (2016)An AI-assisted Approach for Checking the Completeness of Privacy Policies Against GDPR., , , , , , and . RE, page 136-146. IEEE, (2020)Modeling data protection and privacy: application and experience with GDPR., , , , and . Softw. Syst. Model., 20 (6): 2071-2087 (2021)Deep learning techniques to detect cybersecurity attacks: a systematic mapping study., , and . Empir. Softw. Eng., 28 (3): 76 (June 2023)Privacy-Preservation Techniques for IoT Devices: A Systematic Mapping Study., , and . IEEE Access, (2023)A systematic identification of consistency rules for UML diagrams., , , and . J. Syst. Softw., (2018)How consistency is handled in model-driven software engineering and UML: an expert opinion survey., , , and . Softw. Qual. J., 31 (1): 1-54 (March 2023)