From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

TESTREX: a Testbed for Repeatable Exploits., , , и . CSET, USENIX Association, (2014)Using Walk-SAT and Rel-Sat for Cryptographic Key Search.. IJCAI, стр. 290-295. Morgan Kaufmann, (1999)How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners., и . NordSec, том 7617 из Lecture Notes in Computer Science, стр. 89-104. Springer, (2012)Security-by-Contract for the OSGi Platform., , и . SEC, том 376 из IFIP Advances in Information and Communication Technology, стр. 364-375. Springer, (2012)Verifying the SET registration protocols., , и . IEEE J. Sel. Areas Commun., 21 (1): 77-87 (2003)REW-SMT: A New Approach for Rewriting XACML Request with Dynamic Big Data Security Policies., , и . SpaCCS, том 10656 из Lecture Notes in Computer Science, стр. 501-515. Springer, (2017)Building Principles for Lawful Cyber Lethal Autonomous Weapons., и . IEEE Secur. Priv., 20 (2): 101-106 (2022)Technical Leverage: Dependencies Are a Mixed Blessing., и . IEEE Secur. Priv., 19 (3): 58-62 (2021)Guest Editorial: Special section on software reliability and security., , и . Inf. Softw. Technol., 54 (12): 1376 (2012)Goal-Equivalent Secure Business Process Re-engineering., , и . ICSOC Workshops, том 4907 из Lecture Notes in Computer Science, стр. 212-223. Springer, (2007)