Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attuning Adaptation Rules via a Rule-Specific Neural Network., , , , , , , , and . ISoLA (3), volume 13703 of Lecture Notes in Computer Science, page 215-230. Springer, (2022)Tool-Based Attack Graph Estimation and Scenario Analysis for Software Architectures., and . ECSA (Tracks and Workshops), volume 13928 of Lecture Notes in Computer Science, page 45-61. Springer, (2022)Handling Environmental Uncertainty in Design Time Access Control Analysis., , , , , , and . SEAA, page 382-389. IEEE, (2022)Automatic Derivation of Vulnerability Models for Software Architectures., , , , and . ICSA-C, page 276-283. IEEE, (2023)Model-based Confidentiality Analysis under Uncertainty., , , , , and . ICSA-C, page 256-263. IEEE, (2023)Architectural Attack Propagation Analysis for Identifying Confidentiality Issues., , and . ICSA, page 1-12. IEEE, (2022)Stabilisierungspolitik. Wissen kompakt Verl. Wiss. & Praxis, Sternenfels u.a., (1998)Teaching Programming at Scale., , , , , , and . SEUH, volume 2531 of CEUR Workshop Proceedings, page 2-6. CEUR-WS.org, (2020)A Taxonomy of Dynamic Changes Affecting Confidentiality., , and . Softwaretechnik-Trends, 40 (2): 35-36 (2020)Dynamic Access Control in Industry 4.0 Systems., , , , , , , and . Digital Transformation, Springer, (2022)