Search

Your search keyword '"Gadyatskaya, Olga"' showing total 265 results

Search Constraints

Start Over You searched for: "Gadyatskaya, Olga" Remove constraint "Gadyatskaya, Olga"
265 results on '"Gadyatskaya, Olga"'

Search Results

1. FedFixer: Mitigating Heterogeneous Label Noise in Federated Learning

2. Automated generation of attack trees with optimal shape and labelling

3. Meta Generative Flow Networks with Personalization for Task-Specific Adaptation

4. Secure Software Development Methodologies: A Multivocal Literature Review

5. Beyond the Surface: Investigating Malicious CVE Proof of Concept Exploits on GitHub

6. A Novel Approach for Attack Tree to Attack Graph Transformation: Extended Version

9. Evaluating Rule-Based Global XAI Malware Detection Methods

10. Dissecting Android Cryptocurrency Miners

11. Fine-grained Code Coverage Measurement in Automated Black-box Android Testing

12. Attribute Evaluation on Attack Trees with Incomplete Information

14. Instrumentation Blueprints: Towards Combining Several Android Instrumentation Tools

15. A Novel Approach for Attack Tree to Attack Graph Transformation

17. How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems

18. Attack-Tree Series: A Case for Dynamic Attack Tree Analysis

20. MAP-REDUCE Runtime Enforcement of Information Flow Policies

21. New Directions in Attack Tree Research: Catching up with Industrial Needs

22. Refinement-Aware Generation of Attack Trees

23. Towards Empirical Evaluation of Automated Risk Assessment Methods

24. Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study

25. Small Changes, Big Changes: An Updated View on the Android Permission System

26. Modelling Attack-defense Trees Using Timed Automata

27. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

28. How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems

29. Evaluation of Resource-Based App Repackaging Detection in Android

30. Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees

33. FSquaDRA: Fast Detection of Repackaged Applications

36. Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract

38. Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications

39. Load Time Security Verification

41. Can We Support Applications’ Evolution in Multi-application Smart Cards by Security-by-Contract?

42. Using EDP-Polynomials for Network Structure Optimization

50. Applied Cryptography and Network Security Workshops

Catalog

Books, media, physical & digital resources