Multi-model run-time security analysis |
|
Limiting Recertification in Highly Configurable Systems: Analyzing Interactions and Isolation among Configuration Options |
|
Limiting Recertification in Highly Configurable Systems: Analyzing Interactions and Isolation among Configuration Options (poster) |
|
Limiting Recertification in Highly Configurable Systems: Analyzing Interactions and Isolation among Configuration Options |
|
Highly Configurable Systems |
|
Characterizing Configuration Complexity in Highly-Configurable Systems with Variational Call Graphs |
|
Detecting Insider Threats in Software Systems using Graph Models of Behavior Paths |
|
Composability of Big Data and Algorithms for Social Networks Analysis Metrics |
|