Author of the publication

Incremental Security Verification for Evolving UMLsec models.

, , , and . ECMFA, volume 6698 of Lecture Notes in Computer Science, page 52-68. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assuring BetterTimes., , , and . Journal of Computer Security, 26 (4): 557-587 (2018)Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing., , , and . CODASPY, page 231-242. ACM, (2019)Design-time Quantification of Integrity in Cyber-physical Systems., , and . PLAS@CCS, page 63-74. ACM, (2017)NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems., , , , , , and . AsiaCCS, page 483-497. ACM, (2018)Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures., , , , and . CoRR, (2018)FEEBO: An Empirical Evaluation Framework for Malware Behavior Obfuscation., , , , and . CoRR, (2015)Taming the War in Memory: A Resilient Mitigation Strategy Against Memory Safety Attacks in CPS., , , , and . CoRR, (2018)Jif-Based Verification of Information Flow Policies for Android Apps., , and . IJSSE, 8 (1): 28-42 (2017)Non-interference on UML State-Charts., , and . TOOLS (50), volume 7304 of Lecture Notes in Computer Science, page 219-235. Springer, (2012)MACKE: compositional analysis of low-level vulnerabilities with symbolic execution., , , and . ASE, page 780-785. ACM, (2016)