Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Severity Prediction of Software Vulnerabilities based on their Text Description., , , , and . SYNASC, page 171-177. IEEE, (2021)Early Detection of Vulnerabilities from News Websites using Machine Learning Models., , , , , and . RoEduNet, page 1-6. IEEE, (2020)What are the Latest Cybersecurity Trends? A Case Study Grounded in Language Models., , , , , and . SYNASC, page 140-146. IEEE, (2021)Early Usability Evaluation to Enhance User Interfaces - A Use Case on the Yggdrasil Cybersecurity Mockup., , , , , and . RoCHI, page 103-110. Matrix Rom, (2021)Yggdrasil - Early Detection of Cybernetic Vulnerabilities from Twitter., , , , , and . CSCS, page 463-468. IEEE, (2021)Web Application Honeypot Published in the Wild., , and . RoEduNet, page 1-6. IEEE, (2020)CODA footprint continuous security management platform., , and . RoEduNet, page 1-5. IEEE, (2016)Interpretable Identification of Cybersecurity Vulnerabilities from News Articles., , , , and . RANLP, page 428-436. INCOMA Ltd., (2021)Analyzing Risk Evaluation Frameworks and Risk Assessment Methods., , , and . RoEduNet, page 1-6. IEEE, (2020)Why IoT security is failing. The Need of a Test Driven Security Approach., , , , and . RoEduNet, page 1-6. IEEE, (2018)