Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Alternating Automaton for First-Order Linear Temporal Logic-Tech Report., , and . CoRR, (2016)Which security policies are enforceable by runtime monitors? A survey., and . Comput. Sci. Rev., 6 (1): 27-45 (2012)Detecting trend deviations with generic stream processing patterns., , , and . Inf. Syst., (2021)Are Backdoor Mandates Ethical? - A Position Paper., and . IEEE Technol. Soc. Mag., 41 (4): 63-70 (2022)Microtext Processing., , and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)A Few Things We Heard About RV Tools (Position Paper)., , and . RV-CuBES, volume 3 of Kalpa Publications in Computing, page 89-95. EasyChair, (2017)Employing Feature Selection to Improve the Performance of Intrusion Detection Systems., , , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 93-112. Springer, (2021)Using Equivalence Relations for Corrective Enforcement of Security Policies., and . MMM-ACNS, volume 6258 of Lecture Notes in Computer Science, page 139-154. Springer, (2010)Decentralized Enforcement of Artifact Lifecycles., , , and . EDOC, page 1-10. IEEE Computer Society, (2016)Runtime Enforcement with Partial Control., and . FPS, volume 9482 of Lecture Notes in Computer Science, page 102-116. Springer, (2015)