Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Applying FMEA to SOAs: A Proposal and Open Challenges., , and . SERENE, volume 8785 of Lecture Notes in Computer Science, page 86-100. Springer, (2014)Towards a Robustness Assessment Methodology for IoT Systems., , and . LADC, page 1-4. IEEE, (2021)A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate., , , , and . MedComNet, page 1-8. IEEE, (2020)Experimenting Machine Learning Techniques to Predict Vulnerabilities., , and . LADC, page 151-156. IEEE Computer Society, (2016)Evaluating and Improving Penetration Testing in Web Services., and . ISSRE, page 201-210. IEEE Computer Society, (2012)HInjector: Injecting Hypercall Attacks for Evaluating VMI-based Intrusion Detection Systems, , , , and . The 2013 Annual Computer Security Applications Conference (ACSAC 2013), Maryland, USA, Applied Computer Security Associates (ACSA), (March 2013)Detecting Vulnerabilities in Service Oriented Architectures., and . ISSRE Workshops, page 134-139. IEEE Computer Society, (2012)Coverage Metrics and Detection of Injection Vulnerabilities: An Experimental Study., , and . EDCC, page 45-52. IEEE Computer Society, (2016)SOA-Scanner: An Integrated Tool to Detect Vulnerabilities in Service-Based Infrastructures., and . IEEE SCC, page 280-287. IEEE Computer Society, (2013)Intrusion Detection for Scalable and Elastic Microservice Applications., , and . PRDC, page 39-45. IEEE, (2023)