Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model-based security testing: a taxonomy and systematic classification., , , , and . Softw. Test., Verif. Reliab., 26 (2): 119-148 (2016)Representation-Independent Data Usage Control., , and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 122-140. Springer, (2011)Chapter One - Security Testing: A Survey., , , , , and . Advances in Computers, (2016)SPaCiTE - Web Application Testing Engine., , and . ICST, page 858-859. IEEE Computer Society, (2012)Security Testing: A Survey., , , , , and . Advances in Computers, (2016)Security Mutants for Property-Based Testing., , and . TAP, volume 6706 of Lecture Notes in Computer Science, page 69-77. Springer, (2011)Semi-Automatic Security Testing of Web Applications from a Secure Model., , and . SERE, page 253-262. IEEE, (2012)Security Testing with Fault-Models and Properties.. ICST, page 501-502. IEEE Computer Society, (2013)CRiOS: Toward Large-Scale iOS Application Analysis., , and . SPSM@CCS, page 33-42. ACM, (2016)Model inference and security testing in the spacios project., , , , , and . CSMR-WCRE, page 411-414. IEEE Computer Society, (2014)