Author of the publication

Reactive Security for Smart Grids Using Models@run.time-Based Simulation and Reasoning.

, , , , and . SmartGridSec, volume 8448 of Lecture Notes in Computer Science, page 139-153. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-Wise Test Configurations for Software Product Lines., , , , , and . IEEE Trans. Software Eng., 40 (7): 650-670 (2014)Model Driven Mutation Applied to Adaptative Systems Testing., , , , , and . ICST Workshops, page 408-413. IEEE Computer Society, (2011)Reconciling Automation and Flexibility in Product Derivation., , , and . SPLC, page 339-348. IEEE Computer Society, (2008)A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected?, , , , , and . COMPSAC, page 384-393. IEEE Computer Society, (2014)IccTA: Detecting Inter-Component Privacy Leaks in Android Apps., , , , , , , , , and . ICSE (1), page 280-291. IEEE Computer Society, (2015)Accessing Inaccessible Android APIs: An Empirical Study., , , and . ICSME, page 411-422. IEEE Computer Society, (2016)Model Driven Mutation Applied to Adaptative Systems Testing, , , , , and . CoRR, (2012)Impact of Tool Support in Patch Construction., , , , , and . CoRR, (2018)Revisiting the impact of common libraries for android-related investigations., , , , , and . Journal of Systems and Software, (2019)Characterizing malicious Android apps by mining topic-specific data flow signatures., , , , , and . Information & Software Technology, (2017)