From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attacking a packet Analyzer: Caronte case study., , и . CSR, стр. 269-274. IEEE, (2023)Semi-Automatic PenTest Methodology based on Threat-Model: The IoT Brick Case Study., , и . CloudCom, стр. 232-237. IEEE, (2023)Risk Analysis Automation Process in IT Security for Cloud Applications., , и . CLOSER (Selected Papers), том 1607 из Communications in Computer and Information Science, стр. 47-68. Springer, (2021)Threat Modeling of Edge-Based IoT Applications., , , и . QUATIC, том 1439 из Communications in Computer and Information Science, стр. 282-296. Springer, (2021)A Semantic Methodology for Security Controls Verification in Public Administration Business Processes., , , и . CISIS, том 497 из Lecture Notes in Networks and Systems, стр. 456-466. Springer, (2022)Leveraging Threat Modelling for Effective Penetration Testing in 5G Systems., , , и . CSR, стр. 180-185. IEEE, (2024)Systematic analysis of automated threat modelling techniques: Comparison of open-source tools., и . Softw. Qual. J., 32 (1): 125-161 (марта 2024)A Cyclical Penetration Testing Automation Methodology: The JetRacer Case Study., , , и . AINA (2), том 246 из Lecture Notes on Data Engineering and Communications Technologies, стр. 340-353. Springer, (2025)MetaSEnD: A Security Enabled Development Life Cycle Meta-Model., , и . ARES, стр. 152:1-152:10. ACM, (2022)Security in IoT Pairing & Authentication protocols, a Threat Model, a Case Study Analysis., , , и . ITASEC, том 2940 из CEUR Workshop Proceedings, стр. 207-218. CEUR-WS.org, (2021)