Author of the publication

How Secure is AI-based Coding?: A Security Analysis Using STRIDE and Data Flow Diagrams.

, , and . VCC, page 56-61. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

P-HIP: A Lightweight and Privacy-Aware Host Identity Protocol for Internet of Things., and . IEEE Internet Things J., 8 (1): 555-571 (2021)A component-based framework for radio-astronomical imaging software systems., , and . Softw. Pract. Exp., 38 (5): 493-507 (2008)Towards Strengthening the Security of Healthcare Devices using Secure Configuration Provenance.. ICDH, page 228-233. IEEE, (2022)Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities., , and . LREC, page 1355-1358. European Language Resources Association (ELRA), (2014)Secure Provenance: Protecting theGenealogy of Bits., , and . login Usenix Mag., (2009)The Enemy Within: The Emerging Threats to Healthcare from Malicious Mobile Devices, and . CoRR, (2012)Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities., , and . CoRR, (2013)Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems, and . CoRR, (2013)Please Permit Me: Stateless Delegated Authorization in Mashups, , , , and . Proceedings of the 2008 Annual Computer Security Applications Conference, Anaheim, California, IEEE Computer Society Press, (December 2008)Towards a Threat Model and Privacy Analysis for V2P in 5G Networks., and . 5GWF, page 383-387. IEEE, (2021)