Author of the publication

Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings.

, , , , and . SE, volume P-300 of LNI, page 51-52. Gesellschaft für Informatik e.V., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Delta Security Certification for Software Supply Chains., and . IEEE Secur. Priv., 21 (6): 24-33 (November 2023)Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings., , , , and . SE, volume P-300 of LNI, page 51-52. Gesellschaft für Informatik e.V., (2020)Precise Analysis of Purpose Limitation in Data Flow Diagrams., , , , and . ARES, page 17:1-17:11. ACM, (2022)Analyzing and Mitigating (with LLMs) the Security Misconfigurations of Helm Charts from Artifact Hub., , and . CoRR, (2024)Checking Security Compliance between Models and Code., , , , and . CoRR, (2021)Seven Pain Points of Threat Analysis and Risk Assessment in the Automotive Domain., and . IEEE Secur. Priv., 19 (5): 78-82 (2021)A replication of a controlled experiment with two STRIDE variants., and . CoRR, (2022)Checking security compliance between models and code., , , , and . Softw. Syst. Model., 22 (1): 273-296 (February 2023)The Role of Diversity in Cybersecurity Risk Analysis: An Experimental Plan., and . GE@ICSE, page 12-18. ACM / IEEE, (2022)Towards Automated Security Design Flaw Detection., , , , and . ASE Workshops, page 49-56. IEEE, (2019)