From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A survey of autonomic communications, , , , , , , , , и . ACM Trans. Auton. Adapt. Syst., 1 (2): 223--259 (2006)Solving QBF by SMV., , , и . KR, стр. 578-592. Morgan Kaufmann, (2002)TESTREX: a Testbed for Repeatable Exploits., , , и . CSET, USENIX Association, (2014)Requirements Engineering for Trust Management: Model, Methodology, and Reasoning, , , и . International Journal of Information Security, 5 (4): 257--274 (2006)Attack Potential in Impact and Complexity., и . CoRR, (2018)A preliminary analysis of vulnerability scores for attacks in wild: the ekits and sym datasets., и . BADGERS@CCS, стр. 17-24. ACM, (2012)On the feasibility of detecting injections in malicious npm packages., , , и . ARES, стр. 115:1-115:8. ACM, (2022)Security-by-contract for web services., и . SWS, стр. 90-98. ACM, (2007)Security views for outsourced business processes., , и . SWS, стр. 45-52. ACM, (2008)How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners., и . NordSec, том 7617 из Lecture Notes in Computer Science, стр. 89-104. Springer, (2012)