Search for persons
X
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
8
Framework for Calculating Residual Cybersecurity Risk of Th..:
, In:
?
2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C) ,
9
Formalising UPTANE in CSP for Security Testing:
, In:
?
Information Security Theory and Practice; Lecture Notes in Computer Science ,
11
A Template-Based Method for the Generation of Attack Trees:
, In:
?
2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE) ,
13
Attack Defense Trees with Sequential Conjunction:
, In:
?
Proceedings of the Genetic and Evolutionary Computation Conference Companion ,
15