Author of the publication

Testing Interoperability Security Policies.

, , and . SEKE, page 464-469. Knowledge Systems Institute Graduate School, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Standardization of Formal Methods in Conformance Testing of Communication Protocols., , and . Computer Networks and ISDN Systems, 29 (1): 3-14 (1996)A modal based verification for LOTOS., and . FORTE, volume 6 of IFIP Conference Proceedings, page 215-217. Chapman & Hall, (1994)Different Approaches to Protocol and Service Testing.. IWTCS, volume 147 of IFIP Conference Proceedings, page 3-18. Kluwer, (1999)An Analysis of Secure M2M Communication in WSNs Using DTLS., , and . ICDCS Workshops, page 78-83. IEEE Computer Society, (2016)A passive testing approach based on invariants: application to the WAP, , , and . Comput. Networks, 48 (2): 235-245 (2005)TestNet: Let's Test Together!., , and . TestCom, volume 2644 of Lecture Notes in Computer Science, page 258-264. Springer, (2003)A Study of Threat Detection Systems and Techniques in the Cloud., , and . CRiSIS, volume 10694 of Lecture Notes in Computer Science, page 140-155. Springer, (2017)Smart Measurements and Analysis for Software Quality Enhancement., , , and . ICSOFT (Selected Papers), volume 1077 of Communications in Computer and Information Science, page 194-219. Springer, (2018)Special issue on formal active and passive testing of distributed and networked systems., , and . Ann. des Télécommunications, 70 (3-4): 83-84 (2015)Formal Verification of Coordination Systems' Requirements - A Case Study on the European Train Control System., and . SEKE, page 393-396. Knowledge Systems Institute Graduate School, (2014)