共 50 条
- [2] Expressive and Systematic Risk Assessments with Instance-Centric Threat Models 38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023, 2023, : 1450 - 1457
- [4] Assessing Run-time Overhead of Securing Kepler INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE 2016 (ICCS 2016), 2016, 80 : 2281 - 2286
- [5] Run-time Attack Detection in Cryptographic APIs 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 176 - 188
- [7] Threat modeling at run time: the case for reflective and adaptive threat management (NIER track) 2021 INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS (SEAMS 2021), 2021, : 203 - 209
- [8] Risk Assessment Tool for Operation: from Threat Models to Risk Indicators 2015 IEEE EINDHOVEN POWERTECH, 2015,
- [9] Run-time Selection of Security Algorithms For Networked Devices Q2SWINET09: PROCEEDING OF THE FIFTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2009, : 92 - 96
- [10] Run-time principals in information-flow type systems ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2008, 30 (01):