Author of the publication

The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game.

, , , , and . IEEE Trans. Software Eng., 45 (5): 521-536 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Schrödinger's security: opening the box on app developers' security rationale., , , , , , , and . ICSE, page 149-160. ACM, (2020)Privacy Requirements: Present & Future., , and . ICSE-SEIS, page 13-22. IEEE Computer Society, (2017)Software Engineering for Privacy in-the-Large., and . ICSE (2), page 947-948. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).An approach for aspect-oriented use case modeling., and . EA@ICSE, page 27-34. ACM, (2008)Do the Privacy Policies Reflect the Privacy Controls on Social Networks?, , and . SocialCom/PASSAT, page 1155-1158. IEEE Computer Society, (2011)Aspect-oriented use case modeling for software product lines., and . EA@AOSD, page 5:1-5:8. ACM, (2008)Inferring Semantic Mapping Between Policies and Code: The Clue is in the Language., , , and . ESSoS, volume 9639 of Lecture Notes in Computer Science, page 233-250. Springer, (2016)Reducing Permission Requests in Mobile Apps., , , , , , and . Internet Measurement Conference, page 259-266. ACM, (2019)A Method for Analysing Traceability between Privacy Policies and Privacy Controls of Online Social Networks., , and . APF, volume 8319 of Lecture Notes in Computer Science, page 187-202. Springer, (2012)Hidden in Plain Sight: Obfuscated Strings Threatening Your Privacy., , , , , , and . AsiaCCS, page 694-707. ACM, (2020)