Author of the publication

A Holistic Approach to Attack Modeling and Analysis.

, , , , and . iStar, volume 1402 of CEUR Workshop Proceedings, page 49-54. CEUR-WS.org, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integration of a Novel Neural Network Algorithm and Kirkpatrick Model and Its Application in R&D Performance Evaluation., , , and . CSSE (1), page 353-356. IEEE Computer Society, (2008)Performance Analysis of Co- and Cross-tier Device-to-Device Communication Underlaying Macro-small Cell Wireless Networks., , , , and . TIIS, 10 (4): 1481-1500 (2016)Security Requirements Engineering in the Wild: A Survey of Common Practices., , , and . COMPSAC, page 314-319. IEEE Computer Society, (2011)Negotiating Service Requirements among Strategic Actors., , , and . COMPSAC Workshops, page 31-36. IEEE Computer Society, (2010)LinSched: The Linux Scheduler Simulator., , , , and . ISCA PDCCS, page 171-176. ISCA, (2008)Throughput Improvement in Cellular Networks via Full-Duplex Based Device-to-Device Communications., , , , and . IEEE Access, (2016)Differentially private Naive Bayes learning over multiple data sources., , , , and . Inf. Sci., (2018)Data security against receiver corruptions: SOA security for receivers from simulatable DEMs., , , , and . Inf. Sci., (2019)Temporal error concealment using quad-tree prediction and coherency sensitive hashing for HEVC., , , , , and . J. Electronic Imaging, 27 (03): 033039 (2018)Principal Feature Analysis: A Multivariate Feature Selection Method for fMRI Data., , , , and . Comp. Math. Methods in Medicine, (2013)