Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Models-Based Analysis of Both User and Attacker Tasks: Application to EEVEHAC., , , , , and . HCSE, volume 13482 of Lecture Notes in Computer Science, page 70-89. Springer, (2022)A tool for security metrics modeling and visualization, , , and . Proceedings of the 2014 European Conference on Software Architecture Workshops, page 3. ACM, (2014)A tool for security metrics modeling and visualization., , , and . ECSA Workshops, page 3:1-3:7. ACM, (2014)Visualizing network events in a muggle friendly way., , , , , , and . CyberSA, page 1-4. IEEE, (2017)Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC., , , and . SECRYPT, page 659-664. SCITEPRESS, (2021)Proof-of-Concept for a Granular Incident Management Information Sharing Scheme., , , , , , and . AIIoT, page 515-520. IEEE, (2022)Security Risk Visualization with Semantic Risk Model., , , , and . ANT/SEIT, volume 83 of Procedia Computer Science, page 1194-1199. Elsevier, (2016)Light Quantum Key Distribution Network Security Estimation Tool., , , and . SECRYPT, page 587-596. SCITEPRESS, (2023)CryptoVault - A Secure Hardware Wallet for Decentralized Key Management., , , , and . COINS, page 1-4. IEEE, (2021)Visualising network events in a muggle friendly way, , , , , , and . Centre for Multidisciplinary Research, Innovation and Collaboration, IEEE, (2017)