Personensuche
X
?
Advanced Information Networking and Applications; Lecture Notes on Data Engineering and Communications Technologies ,
1
DEFEDGE: Threat-Driven Security Testing and Proactive Defen..:
, In:
?
Proceedings of the 19th International Conference on Availability, Reliability and Security ,
3
Advancing ESSecA: a step forward in Automated Penetration T..:
, In:
?
2023 IEEE International Conference on Cyber Security and Resilience (CSR) ,
6
Attacking a packet Analyzer: Caronte case study:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
9
MetaSEnD: A Security Enabled Development Life Cycle Meta-Mo..:
, In:
?
Communications in Computer and Information Science; Quality of Information and Communications Technology ,
10
Automated Threat Modeling Approaches: Comparison of Open So..:
, In:
?
Complex, Intelligent and Software Intensive Systems; Lecture Notes in Networks and Systems ,
11
A Semantic Methodology for Security Controls Verification i..:
, In:
?
Communications in Computer and Information Science; Cloud Computing and Services Science ,
12
Risk Analysis Automation Process in IT Security for Cloud A..:
, In:
?
2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) ,
14
MAVLink Protocol for Unmanned Aerial Vehicle: Vulnerabiliti..:
, In:
?
2021 IEEE International Conference on Cyber Security and Resilience (CSR) ,
15