Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Random Test Data Generation for Java Classes Annotated with JML Specifications., and . Software Engineering Research and Practice, page 385-391. CSREA Press, (2007)Achieving Security Assurance with Assertion-based Application Construction., , and . EAI Endorsed Trans. Collaborative Computing, 1 (6): e3 (2015)Achieving security assurance with assertion-based application construction., , and . CollaborateCom, page 503-510. ICST / IEEE, (2014)EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems., , , and . SmartGridComm, page 1-6. IEEE, (2018)Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies., , , , and . SACMAT, page 195-206. ACM, (2019)The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS., , , and . CHASE, page 94-99. IEEE, (2018)ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems., , , and . MSCPES@CPSIoTWeek, page 1-6. IEEE, (2019)Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control., , , , and . MTD@CCS, page 39-49. ACM, (2017)Architectural Assertions: Checking Architectural Constraints at Run-Time., , , and . Software Engineering Research and Practice, page 604-607. CSREA Press, (2007)Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned., , and . COMPSAC, page 21-26. IEEE Computer Society, (2013)