| Publication | Date of Publication | Type |
|---|
| Analyzing and Mitigating (with LLMs) the Security Misconfigurations of Helm Charts from Artifact Hub | 2025-02-18 | Dataset |
| Today's cat is tomorrow's dog: accounting for time-based changes in the labels of ML vulnerability detection approaches (Replication Package Part 2: Linux dataset) | 2025-02-11 | Dataset |
| Today's cat is tomorrow's dog: accounting for time-based changes in the labels of ML vulnerability detection approaches (Replication Package Part 3: OpenSSL dataset) | 2025-02-11 | Dataset |
| Today's cat is tomorrow's dog: accounting for time-based changes in the labels of ML vulnerability detection approaches (Replication Package Part 4: Poppler Dataset) | 2025-02-11 | Dataset |
| On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair tools - Dataset | 2024-05-04 | Dataset |
| A Case-Control Study to Measure Behavioral Risks of Malware Encounters in Organizations | 2024-04-15 | Dataset |
| Artefact for ``Addressing Combinatorial Experiments and Scarcity of Subjects by Provably Orthogonal and Crossover Experimental Designs | 2024-02-19 | Dataset |
| Artefact for ``Addressing Combinatorial Experiments and Scarcity1 of Subjects by Provably Orthogonal and Crossover2 Experimental Designs | 2024-02-16 | Dataset |
| Cross-ecosystem categorization: A manual-curation protocol for the categorization of Java Maven libraries along Python PyPI Topics (dataset) | 2024-01-10 | Dataset |
| [DEPRECATED A manually-curated categorisation of Java Maven libraries along Python PyPI Topics (dataset)] | 2024-01-10 | Dataset |
| A graph-based representation of the Hack Forums using Neo4j | 2023-08-09 | Dataset |
| Technical Leverage Analysis in the Python Ecosystem | 2023-07-20 | Dataset |
| Documentary sources of case studies on the issues a data protection officer faces on a daily basis | 2023-04-29 | Dataset |
| Cross-language corpora of privacy policies | 2023-03-16 | Dataset |
| Advanced Persistent Threats (APTs) campaigns database | 2022-11-24 | Dataset |
| Practical witness-key-agreement for blockchain-based dark pools financial trading | 2022-06-22 | Paper |
Minimal disclosure in hierarchical Hippocratic databases with delegation Computer Security – ESORICS 2005 | 2022-03-09 | Paper |
| Technical Leverage Dataset for Java Dependencies in Maven | 2022-03-04 | Dataset |
| Code Analysis Tables for Developers Interviews on Dependencies Paper | 2021-11-27 | Dataset |
| Database - A Calculus of Tracking: Theory and Practice | 2021-01-16 | Dataset |
Strongly analytic tableaux for normal modal logics Automated Deduction — CADE-12 | 2020-01-21 | Paper |
A uniform tableaux method for nonmonotonic modal logics Logics in Artificial Intelligence | 2019-10-08 | Paper |
Tableaux and algorithms for Propositional Dynamic Logic with Converse Automated Deduction — Cade-13 | 2019-01-15 | Paper |
Tableaux methods for access control in distributed systems Lecture Notes in Computer Science | 2019-01-15 | Paper |
Verifying security protocols as planning in logic programming ACM Transactions on Computational Logic | 2017-06-13 | Paper |
Runtime enforcement of security policies on black box reactive programs Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages | 2016-09-29 | Paper |
| Towards an independent semantics and verification technology for the HLPSL specification language | 2013-09-26 | Paper |
Attacking fair-exchange protocols: parallel models vs. trace models Electronic Notes in Theoretical Computer Science | 2013-07-24 | Paper |
A method for security governance, risk, and compliance (GRC): a goal-process approach Foundations of Security Analysis and Design VI | 2011-09-16 | Paper |
A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems Computer Networks | 2009-10-26 | Paper |
Matching in security-by-contract for mobile code The Journal of Logic and Algebraic Programming | 2009-07-20 | Paper |
Trust Management Lecture Notes in Computer Science | 2007-09-25 | Paper |
Verifying the SET purchase protocols Journal of Automated Reasoning | 2007-01-30 | Paper |
How to fake an RSA signature by encoding modular root finding as a SAT problem Discrete Applied Mathematics | 2003-09-15 | Paper |
| scientific article; zbMATH DE number 1926618 (Why is no real title available?) | 2003-06-11 | Paper |
Combining deduction and model checking into tableaux and algorithms for converse-PDL. Information and Computation | 2003-01-14 | Paper |
| scientific article; zbMATH DE number 1844576 (Why is no real title available?) | 2002-12-12 | Paper |
| scientific article; zbMATH DE number 1696817 (Why is no real title available?) | 2002-01-28 | Paper |
| Logical cryptanalysis as a SAT problem | 2001-10-21 | Paper |
| scientific article; zbMATH DE number 1612538 (Why is no real title available?) | 2001-07-01 | Paper |
Logical cryptanalysis as a SAT problem: Encoding and analysis of the U. S. Data Encryption Standard Journal of Automated Reasoning | 2001-05-01 | Paper |
EXPtime tableaux for ALC Artificial Intelligence | 2000-12-12 | Paper |
The proof complexity of analytic and clausal tableaux Theoretical Computer Science | 2000-08-21 | Paper |
Single step tableaux for modal logics. Computational properties, complexity and methodology Journal of Automated Reasoning | 2000-05-17 | Paper |
Tableau methods for formal verification of multi-agent distributed systems Journal Of Logic And Computation | 1998-09-27 | Paper |
| scientific article; zbMATH DE number 1189106 (Why is no real title available?) | 1998-08-13 | Paper |