Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threat Modelling for Web Services Based Web Applications., , , and . Communications and Multimedia Security, volume 175 of IFIP, page 131-144. Springer, (2004)A flexible security architecture to support third-party applications on mobile devices., , , , , , and . CSAW, page 19-28. ACM, (2007)Security of Web Mashups: A Survey., , , , and . NordSec, volume 7127 of Lecture Notes in Computer Science, page 223-238. Springer, (2010)Towards preserving correctness in self-managed software systems., , , , , and . WOSS, page 34-38. ACM, (2004)Scalable Authorization Middleware for Service Oriented Architectures., , and . ESSoS, volume 6542 of Lecture Notes in Computer Science, page 221-233. Springer, (2011)A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation., , , and . SECRYPT, page 257-262. SciTePress, (2012)Position Paper: On Advancing Adversarial Malware Generation Using Dynamic Features., , , , and . WoRMA@AsiaCCS, page 15-20. ACM, (2022)Bridging the gap between web application firewalls and web applications., , , and . FMSE, page 67-77. ACM, (2006)A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs., , , and . USENIX Security Symposium, page 3673-3690. USENIX Association, (2023)Captcha me if you can: Imitation Games with Reinforcement Learning., , , and . EuroS&P, page 719-735. IEEE, (2022)