Search for persons
X
?
2023 3rd Intelligent Cybersecurity Conference (ICSC) ,
3
Why Cyber Threat Modeling Needs Human Factors Expansion: A ..:
, In:
?
2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) ,
4
Systematic Training and Testing for Machine Learning Using ..:
, In:
?
Logic, Language, and Security; Lecture Notes in Computer Science ,
5
Formal Methods Analysis of the Secure Remote Password Proto..:
, In:
?
Lecture Notes in Computer Science; Combinatorial Algorithms ,
6
Algorithms for Constructing Anonymizing Arrays:
, In:
?
Proceedings of the Genetic and Evolutionary Computation Conference Companion ,
7