Author of the publication

Automated software architecture security risk analysis using formalized signatures.

, , and . ICSE, page 662-671. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting automated software re-engineering using re-aspects., , and . ASE, page 230-233. ACM, (2012)A Comprehensive Requirement Capturing Model Enabling the Automated Formalisation of NL Requirements., , , , and . SN Comput. Sci., 4 (1): 57 (2023)Enhancing NL Requirements Formalisation Using a Quality Checking Model., , , , and . RE, page 448-449. IEEE, (2021)The Challenges of Leveraging Threat Intelligence to Stop Data Breaches., , , and . Frontiers Comput. Sci., (2020)RCM: Requirement Capturing Model for Automated Requirements Formalisation., , , , and . MODELSWARD, page 110-121. SCITEPRESS, (2021)Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors., , and . ICECCS, page 70-79. IEEE Computer Society, (2015)SMURF: Supporting Multi-tenancy Using Re-aspects Framework., , and . ICECCS, page 361-370. IEEE Computer Society, (2012)Operating System Kernel Data Disambiguation to Support Security Analysis., , , and . NSS, volume 7645 of Lecture Notes in Computer Science, page 263-276. Springer, (2012)Supporting automated vulnerability analysis using formalized vulnerability signatures., , and . ASE, page 100-109. ACM, (2012)VAM-aaS: Online Cloud Services Security Vulnerability Analysis and Mitigation-as-a-Service., , and . WISE, volume 7651 of Lecture Notes in Computer Science, page 411-425. Springer, (2012)