Author of the publication

Using software reliability models for security assessment - Verification of assumptions.

, , and . ISSRE (Supplemental Proceedings), page 23-24. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prediction of Grades for Reviewing with Automated Peer-review and Reputation Metrics., , and . EDM (Workshops), volume 1633 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)3D Graphical Representation of DNA Sequences and its Application for Long Sequence Searching over Whole Genomes., , , and . SoICT, page 356-363. ACM, (2017)Alignment-free Sequence Searching over Whole Genomes Using 3D Random Plot of Query DNA Sequences., , , and . Informatica (Slovenia), (2018)Using software reliability models for security assessment - Verification of assumptions., , and . ISSRE (Supplemental Proceedings), page 23-24. IEEE Computer Society, (2013)Access Control Policy Evolution: An Empirical Study., , , and . ISSRE, page 245-254. IEEE Computer Society, (2014)Adaptive dynamic quadrature demodulation with autoregressive spectral estimation in ultrasound imaging., , , and . Biomed. Signal Proc. and Control, 7 (4): 371-378 (2012)An eigenvalue-based pivot selection strategy for improving search efficiency in metric spaces., , and . BigComp, page 207-214. IEEE Computer Society, (2016)How Do Users Discover New Tools in Software Development and Beyond?, , , and . Computer Supported Cooperative Work, 24 (5): 389-422 (2015)A case study on refactoring in Haskell programs.. ICSE, page 1164-1166. ACM, (2011)Sequence Searching and Visualizing over 3D Random Plot of Whole Genome Using Skip List., , and . IMCOM, volume 935 of Advances in Intelligent Systems and Computing, page 791-804. Springer, (2019)