Author of the publication

Special issue on "Trustworthy Software Systems for the Digital Society".

, , and . Journal of Systems and Software, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Runtime Prediction of Failure Modes from System Error Logs., and . ICECCS, page 232-241. IEEE Computer Society, (2013)Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection., and . ICC, page 2388-2393. IEEE, (2006)Injecting Comments to Detect JavaScript Code Injection Attacks., and . COMPSAC Workshops, page 104-109. IEEE Computer Society, (2011)The Level of Decomposition Impact on Component Fault Tolerance., and . COMPSAC Workshops, page 57-62. IEEE Computer Society, (2010)Information-Theoretic Detection of SQL Injection Attacks., and . HASE, page 40-47. IEEE Computer Society, (2012)Towards Secure Trust Bootstrapping in Pervasive Computing Environment., , , and . HASE, page 89-96. IEEE Computer Society, (2008)Intrusion detection aware component-based systems: A specification-based framework., and . Journal of Systems and Software, 80 (5): 700-710 (2007)Towards automatic monitoring of component-based software systems., and . Journal of Systems and Software, 74 (1): 15-24 (2005)A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor., and . DASC, page 137-144. IEEE Computer Society, (2011)Routeguard: an intrusion detection and response system for mobile ad hoc networks., , and . WiMob (3), page 336-343. IEEE, (2005)0-7803-9181-0.