Our publications
2020
-
Replication-Guided Enumeration of Minimal Unsatisfiable Subsets
26th International Conference on Principles and Practice of Constraint Programming, year: 2020
-
Rotation Based MSS/MCS Enumeration
LPAR 2020: 23rd International Conference on Logic for Programming, Artificial Intelligence and Reasoning, year: 2020
-
Secure software modeling methods for forensic readiness
Proceedings of the 22nd International Conference on Information Technology for Practice, year: 2020
-
Session-level Adversary Intent-Driven Cyberattack Simulator
Year: 2020
-
Simulation Games Platform for Unintentional Perpetrator Attack Vector Identification
ICSEW'20: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, year: 2020
-
SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security
Proceedings of the 15th International Conference on Availability, Reliability and Security, year: 2020
-
The Future of the Certification of Cybersecurity Technologies
Jusletter IT. Die Zeitschrift für IT und Recht., year: 2020, volume: 2020, edition: 30. September, DOI
-
Towards Creation of Automated Prediction Systems for Trust and Dependability Evaluation
Proceedings of 28th International Conference on Software, Telecommunications and Computer Networks (SoftCom 2020), year: 2020
-
Towards verifiable evidence generation in forensic-ready systems
2020 IEEE International Conference on Big Data (Big Data), year: 2020
-
Traffic and Log Data Captured During a Cyber Defense Exercise
Data in Brief, year: 2020, DOI