Author of the publication

Automated analysis of security requirements through risk-based argumentation.

, , , , and . Journal of Systems and Software, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies., , , , and . Sensors, 18 (11): 4040 (2018)Automated analysis of security requirements through risk-based argumentation., , , , and . Journal of Systems and Software, (2015)Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges., and . Cyber Security, page 1-8. IEEE, (2018)Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks., , , and . ARES, page 293-302. IEEE Computer Society, (2015)Risk and argument: A risk-based argumentation method for practical security., , , , and . RE, page 239-248. IEEE Computer Society, (2011)Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients., , and . SAC, page 66-73. ACM, (2009)WVD: A New Synthetic Dataset for Video-Based Violence Detection., , , and . SGAI Conf., volume 11927 of Lecture Notes in Computer Science, page 158-164. Springer, (2019)Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks., , , , , and . IEEE Access, (2017)TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks., , and . IEEE Access, (2018)A Survey of Deep Learning Solutions for Multimedia Visual Content Analysis., , , and . IEEE Access, (2019)