Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The (Un)Reliability of NVD Vulnerable Versions Data: an Empirical Experiment on Google Chrome Vulnerabilities, and . Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, page 493--498. (May 2013)Action, Inaction, Trust, and Cybersecurity's Common Property Problem., , and . IEEE Secur. Priv., 14 (1): 82-86 (2016)Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard., , and . ER, volume 2813 of Lecture Notes in Computer Science, page 263-276. Springer, (2003)An Empirical Methodology to Evaluate Vulnerability Discovery Models., and . IEEE Trans. Software Eng., 40 (12): 1147-1162 (2014)How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach., , , , and . ICAIL, page 149-153. ACM, (2007)Maintaining privacy on derived objects., , , and . WPES, page 10-19. ACM, (2005)DES: a Challenge Problem for Nonmonotonic Reasoning Systems, , and . CoRR, (2000)Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned., , and . IEEE Trans. Emerg. Top. Comput., 4 (1): 35-46 (2016)Exptime Tableaux for ALC., , and . Description Logics, volume WS-96-05 of AAAI Technical Report, page 107-110. AAAI Press, (1996)Diversity: A Poor Man's Solution to Drone Takeover., , and . PECCS, page 25-34. SciTePress, (2017)