Author of the publication

An advanced approach for modeling and detecting software vulnerabilities.

, , , , , , and . Inf. Softw. Technol., 54 (9): 997-1013 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Design of a Test Case Definition Language., , and . AADEBUG, volume 2 of Linköping Electronic Articles in Computer and Information Science, page 69-78. Linköping University Electronic Press, (1997)A systematic evaluation of disk imaging in EnCase® 6.8 and LinEn 6.1., and . Digital Investigation, 6 (1-2): 61-70 (2009)TRAP: Open Decentralized Distributed Spam Filtering., , and . TrustBus, volume 6863 of Lecture Notes in Computer Science, page 86-97. Springer, (2011)Design of a Process for Software Security., and . ARES, page 301-309. IEEE Computer Society, (2007)A Hybrid Approach to Propagation Analysis., and . AADEBUG, volume 2 of Linköping Electronic Articles in Computer and Information Science, page 193-197. Linköping University Electronic Press, (1997)Data-FIT. Journal of Economic Surveys, 2 (3): 265--272 (245 09 1988)doi: 10.1111/j.1467-6419.1988.tb00047.x.A Cause-Based Approach to Preventing Software Vulnerabilities., and . ARES, page 276-283. IEEE Computer Society, (2008)How can the developer benefit from security modeling?, , , , and . ARES, page 1017-1025. IEEE Computer Society, (2007)Syntax-Directed Construction of Value Dependence Graphs., , and . ICSM, page 692-. IEEE Computer Society, (2001)Contagious errors: Understanding and avoiding issues with imaging drives containing faulty sectors., and . Digital Investigation, 5 (1-2): 29-33 (2008)