Olga Gadyatskaya
Orcid: 0000-0002-3760-9165
According to our database1,
Olga Gadyatskaya
authored at least 47 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Inf. Sci., 2024
You cannot improve what you do not measure: A triangulation study of software security metrics.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
MoreFixes: A Large-Scale Dataset of CVE Fix Commits Mined through Enhanced Repository Discovery.
Proceedings of the 20th International Conference on Predictive Models and Data Analytics in Software Engineering, 2024
"Have Heard of it": A Study with Practitioners on Adoption of Secure Software Development Frameworks.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Nobody Knows the Risks I Have Seen: Evaluating the Gap Between Risk Analysis and Security Operations.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Position: The Explainability Paradox - Challenges for XAI in Malware Detection and Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Proceedings of the Network and System Security - 17th International Conference, 2023
2022
CoRR, 2022
How security professionals are being attacked: A study of malicious CVE proof of concept exploits in GitHub.
CoRR, 2022
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
CoRR, 2021
Proceedings of the Risks and Security of Internet and Systems, 2021
2020
ACM Trans. Softw. Eng. Methodol., 2020
Comput. Secur., 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
Proceedings of the Graphical Models for Security - 6th International Workshop, 2019
2018
CoRR, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
Proceedings of the Graphical Models for Security - 4th International Workshop, 2017
2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0.
Proceedings of the Quantitative Evaluation of Systems - 13th International Conference, 2016
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016
Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study.
Proceedings of the Practice of Enterprise Modeling, 2016
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2016
Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
2015
How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems.
Proceedings of the Graphical Models for Security - Second International Workshop, 2015
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects.
Proceedings of the Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, 2014
2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
High-level algorithms and data structures requirements for security-by-contract on Java cards.
Int. J. Crit. Comput. Based Syst., 2012
Proceedings of the Information Security and Privacy Research, 2012
Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract.
Proceedings of the Formal Methods for Components and Objects, 2012
2011
Proceedings of the POLICY 2011, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
2010
Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications.
Proceedings of the Information Security Technology for Applications, 2010
2008
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008