32 results on '"Heyman, Thomas"'
Search Results
2. Scalar: A Distributed Scalability Analysis Framework
3. The Security Twin Peaks
4. CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests
5. Scalar: A Distributed Scalability Analysis Framework
6. Site-Selective Artificial Ribonucleases: Renaissance of Oligonucleotide Conjugates for Irreversible Cleavage of RNA Sequences
7. Threat modeling
8. K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact)
9. K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact)
10. Systematic scalability assessment for feature oriented multi-tenant services
11. Feature-Based Variability Management for Scalable Enterprise Applications: Experiences with an E-Payment Case
12. SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems
13. Enhanced set of solutions supporting secure service architecture and design
14. A Formal Analysis Technique for Secure Software Architectures (Een formele analysetechniek voor veilige softwarearchitecturen) : A Formal Analysis Technique for Secure Software Architectures
15. Smarmy -- A language to verify the security of software architectures
16. SoSPa: A system of Security design Patterns for systematically engineering secure systems
17. Towards a quantitative assessment of security in software architectures
18. Security patterns: 10 years later
19. Architecting software with security patterns
20. Scalar: Systematic Scalability Analysis with the Universal Scalability Law
21. Scalability Analysis of the OpenAM Access Control System with the Universal Scalability Law
22. Section 337 practice and procedure: a comparative presentation.
23. Security in Context: Analysis and Refinement of Software Architectures
24. Browser protection against cross-site request forgery
25. Risk-Driven Architectural Decomposition
26. Using Security Patterns to Combine Security Metrics
27. An Analysis of the Security Patterns Landscape
28. Reusable Formal Models for Secure Software Architectures.
29. The Security Twin Peaks
30. The Security Twin Peaks
31. An Analysis of the Security Patterns Landscape.
32. An Architecture for the Analysis and Management of Security in Industrial Control Systems
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.