Publications
 
"Computer-Aided Threat Identification",  
CEC 2011, New Orleans, IEEE, 2011.
 
"Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution",  
23rd International Conference on Advanced Information Systems Engineering (CAiSE'11), London, Sringer-Verlag , 2011.
 
"Dynamic Backwards Slicing of Model Transformations",  
Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on, 04/2012.
Accepted
 
"Dynamic constraint satisfaction problems over models",  
Software and Systems Modeling, 11/2010.
 Abstract
 
"Ecore to Genmodel case study solution using the Viatra2 framework",  
Transformation Tool Contest (TTC ’10), Malaga, Spain, 07/2010.
 
"Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec",  
Requirements Engineering Journal, vol. 15(1), 2010.
 
"Enhancing Argumentation with Risk Assessment for Achieving Good-Enough Security",  
Requirements Engineering Journal , Submitted.
 
"Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study",  
SINTEF report: SINTEF, 01/2011.
 
"Evaluation of experiences from applying the PREDIQT method in an industrial case study",  
Secure System Integration and Reliability Improvement (SSIRI), Korea, IEEE Computer Society, 06/2011.
 
"Evolution in Relation to Risk and Trust Management",  
IEEE Computer, vol. 43, issue 5, 05/2010.
 
"Evolution of Security Requirements Tests for Service-Centric Systems",  
International Symposium on Engineering Secure Software and Systems, Madrid, Spain, Springer-Verlag, 02/2011.
 Abstract
 
"Evolutionary risk analysis: Expert judgement",  
Computer safety, reliability, and security (SAFECOMP), Italy, Springer, 09/2011.
 
"Evolving Embedded Systems",  
IEEE Computer, vol. 43, issue 5, 5/2010.
 
"Experimental Assessment of Combining Pattern Matching Strategies with VIATRA2",  
International Journal on Software Tools for Technology Transfer, vol. 12, pp. 211-230, 2010.
 Abstract
 
"Expressive modular fine-grained concurrency specification",  
Principles of Programming Languages (POPL 2011), January, 2011.
 
Expressive modular fine-grained concurrency specification (Extended version),  
, no. CW590: Department of Computer Science, K.U.Leuven, July, 2010.
 
"An Extended Ontology for Security Requirements",  
Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011.
 Abstract
10.1007/978-3-642-22056-2_64
 
"Failboxes: Provably safe exception handling",  
ECOOP 2009 - Object-Oriented Programming, 23rd European Conference, Genova, Italy, July 6-10, 2009, Proceedings, vol. 5653: Springer-Verlag, pp. 470–494, 07/2009.
 
"Formally Based Black Box Monitoring of Security Protocols",  
International Symposium on Engineering Secure Software and Systems (ESSOS 2010): Springer-Verlag, 2010.
 
From BPEL to SAL and Back: a Tool Demo on Back-Annotation with VIATRA2,  
: Consiglio Nazionale delle Ricerche (CNR), pp. 35-42, 09/2010.
Accepted for the SEFM'2010 "Posters and Tool Demo Session" Track
 
"From Goal-Driven Security Requirements Engineering to Secure Design",  
International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
 
"Generating Tests from B Specifications and Dynamic Selection Criteria",  
FAC, Formal Aspects of Computing, vol. 23, no. 1, pp. 3–19, 2011.
Revised and extended version of a paper from the ABZ'08 conference
 
"A Graph Query Language for EMF models",  
Theory and Practice of Model Transformations, Fourth International Conference, ICMT 2011, Zurich, Switzerland, June 27-28, 2011. Proceedings, vol. 6707: Springer, pp. 167-182, 2011.
 Abstract
 
"Graph Transformation with  Incremental  Pattern Matching  on a Relational Database",  
International Symposium on Applications of Graph Transformation With Industrial Relevance (AGTIVE 2011), Budapest, Hungary, 10/2011.
In Review for Post-proceedings.
 
"Guest Editors' Introduction: Evolving Critical Systems",  
IEEE Computer , vol. 43, issue 5, pp. 6, 2010.
          
]  



