Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems | 0 | 0.34 | 2019 |
Static Termination Analysis for Event-driven Distributed Algorithms | 0 | 0.34 | 2019 |
Command Dependencies in Heuristic Safety Analysis of Access Control Models. | 0 | 0.34 | 2019 |
Efficient Heuristic Safety Analysis of Core-based Security Policies. | 0 | 0.34 | 2017 |
Towards a Uniform Framework for Dynamic Analysis of Access Control Models. | 0 | 0.34 | 2017 |
Security Policy Synthesis in Mobile Systems | 0 | 0.34 | 2015 |
WorSE: A Workbench for Model-based Security Engineering. | 6 | 0.44 | 2014 |
Heuristic safety analysis of access control models | 4 | 0.39 | 2013 |
Model-based safety analysis of SELinux security policies. | 3 | 0.38 | 2011 |