Search for persons
X
?
Proceedings of the 2nd International Workshop on Gamification in Software Development, Verification, and Validation ,
4
Cyber Range and Cyber Defense Exercises: Gamification Meets..:
, In:
?
2022 IEEE International Conference on Cyber Security and Resilience (CSR) ,
6
Training the Maritime Security Operations Centre Teams:
, In:
?
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies ,
10
Benchmarking UAQ Solvers:
, In:
?
Information Security Theory and Practice; Lecture Notes in Computer Science ,
11
Automated Security Analysis of IoT Software Updates:
, In:
?
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies ,
12
AQUA : An Efficient Solver for the User Authorization Qu..:
, In:
?
2019 11th International Conference on Cyber Conflict (CyCon) ,
13
Resilience of Cyber-Physical Systems: an Experimental Appra..:
, In:
?
15
Next generation CERTs
NATO science for peace and security series. Sub-series D, Information and communication security, vol. 54