Author of the publication

Usability and Security of Personal Firewalls.

, and . SEC, volume 232 of IFIP, page 37-48. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unified modeling of attacks, vulnerabilities and security activities., and . SESS@ICSE, page 36-42. ACM, (2010)Generalized Algorithmic Debugging and Testing., , , and . LOPLAS, 1 (4): 303-322 (1992)Towards a structured unified process for software security., , and . SESS@ICSE, page 3-10. ACM, (2006)User modelling for live help systems: initial results., , and . EC, page 194-197. ACM, (2001)Template Generation for Identifying Text Patterns., and . ISMIS, volume 1932 of Lecture Notes in Computer Science, page 463-473. Springer, (2000)Interprocedural Dynamic Slicing., , and . PLILP, volume 631 of Lecture Notes in Computer Science, page 370-384. Springer, (1992)Characterizing the Use of Code Obfuscation in Malicious and Benign Android Apps., , and . ARES, page 27:1-27:12. ACM, (2023)TRIFU: The Right Information For yoU., and . HICSS (4), page 505-512. IEEE Computer Society, (1998)sButler: A Mediator between Organizations' Workflows and the Semantic Web, , , and . Web Service Semantics: Towards Dynamic Business Integration. Workshop at The Fourteenth International World Wide Web Conference (WWW 2005), (May 2005)Generalized Algorithmic Debugging and Testing., , , and . PLDI, page 317-326. ACM, (1991)