Autor/in Scandariato, Riccardo Joosen, Wouter 3 Buyens, Koen 2 Yskout, Koen 2 Baelen, Stefan van 1 Baudry, Benoit 1 Ben David, Olivier Nathanael 1 Demeyer, Serge 1 Heyman, Tom 1 Hovsepyan, Aram 1 Schmidt, Holger 1 Yu, Yijun 1 alle zeigenListe einklappen
The security twin peaks Heyman, Tom Yskout, Koen Scandariato, Riccardo Schmidt, Holger Yu, Yijun 2011 - TUHH Open Research
Composition of least privilege analysis results in software architectures Buyens, Koen Scandariato, Riccardo Joosen, Wouter 2011 - TUHH Open Research
Preserving aspects via automation: a maintainability study Hovsepyan, Aram Scandariato, Riccardo Baelen, Stefan van Joosen, Wouter Demeyer, Serge 2011 - TUHH Open Research
Requirements-driven runtime reconfiguration for security Yskout, Koen Ben David, Olivier Nathanael Scandariato, Riccardo Baudry, Benoit 2011 - TUHH Open Research
Least privilege analysis in software architectures Buyens, Koen Scandariato, Riccardo Joosen, Wouter 2011 - TUHH Open Research