From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Modelsn, , , , и . Journal of Systems and Software, (2018)Information security management and the human aspect in organizations., и . Inf. Comput. Secur., 25 (5): 494-534 (2017)Ontology-driven evolution of software security., , , и . Data Knowl. Eng., (2021)Developing Secure Systems with UMLsec - From Business Processes to Implementation.. VIS, стр. 151-161. Vieweg+Teubner Verlag, (2001)Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain., , , , и . ICBC, стр. 1-5. IEEE, (2022)Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project.. AVoCS, том 250 из Electronic Notes in Theoretical Computer Science, стр. 123-136. Elsevier, (2007)Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings., , , , и . MoDELS, стр. 23-33. IEEE, (2019)Privacy-enhanced system design modeling based on privacy features., , и . SAC, стр. 1492-1499. ACM, (2019)Wie transformieren Versicherungsunternehmen ihre IT-Infrastrukturen ins digitale Zeitalter?, , и . Wirtschaftsinformatik Manag., 10 (3): 74-79 (2018)Knowledge guided multi-filter residual convolutional neural network for ICD coding from clinical text., , и . Neural Comput. Appl., 35 (24): 17633-17644 (августа 2023)