default search action
Olga Gadyatskaya
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Xinyuan Ji, Xu Zhang, Wei Xi, Haozhi Wang, Olga Gadyatskaya, Yinchuan Li:
Meta Generative Flow Networks with personalization for task-specific adaptation. Inf. Sci. 672: 120569 (2024) - [c35]Xinyuan Ji, Zhaowei Zhu, Wei Xi, Olga Gadyatskaya, Zilong Song, Yong Cai, Yang Liu:
FedFixer: Mitigating Heterogeneous Label Noise in Federated Learning. AAAI 2024: 12830-12838 - [c34]Nathan Daniel Schiele, Jari Egberts, Olga Gadyatskaya:
Nobody Knows the Risks I Have Seen: Evaluating the Gap Between Risk Analysis and Security Operations. EuroS&P Workshops 2024: 473-483 - [c33]L. Rui, Olga Gadyatskaya:
Position: The Explainability Paradox - Challenges for XAI in Malware Detection and Analysis. EuroS&P Workshops 2024: 554-561 - [c32]Alex Wee, Arina Kudriavtseva, Olga Gadyatskaya:
"Have Heard of it": A Study with Practitioners on Adoption of Secure Software Development Frameworks. EuroS&P Workshops 2024: 626-633 - [c31]Jafar Akhoundali, Sajad Rahim Nouri, Kristian F. D. Rietveld, Olga Gadyatskaya:
MoreFixes: A Large-Scale Dataset of CVE Fix Commits Mined through Enhanced Repository Discovery. PROMISE 2024: 42-51 - [c30]Arina Kudriavtseva, Olga Gadyatskaya:
You cannot improve what you do not measure: A triangulation study of software security metrics. SAC 2024: 1223-1232 - [i11]Xinyuan Ji, Zhaowei Zhu, Wei Xi, Olga Gadyatskaya, Zilong Song, Yong Cai, Yang Liu:
FedFixer: Mitigating Heterogeneous Label Noise in Federated Learning. CoRR abs/2403.16561 (2024) - 2023
- [c29]Rui Li, Olga Gadyatskaya:
Evaluating Rule-Based Global XAI Malware Detection Methods. NSS 2023: 3-22 - [i10]Xinyuan Ji, Xu Zhang, Wei Xi, Haozhi Wang, Olga Gadyatskaya, Yinchuan Li:
Meta Generative Flow Networks with Personalization for Task-Specific Adaptation. CoRR abs/2306.09742 (2023) - [i9]Olga Gadyatskaya, Sjouke Mauw, Rolando Trujillo-Rasua, Tim A. C. Willemse:
Automated generation of attack trees with optimal shape and labelling. CoRR abs/2311.13331 (2023) - 2022
- [c28]Arthur van der Staaij, Olga Gadyatskaya:
Instrumentation Blueprints: Towards Combining Several Android Instrumentation Tools. ACNS Workshops 2022: 495-512 - [i8]Soufian El Yadmani, Robin The, Olga Gadyatskaya:
How security professionals are being attacked: A study of malicious CVE proof of concept exploits in GitHub. CoRR abs/2210.08374 (2022) - [i7]Arina Kudriavtseva, Olga Gadyatskaya:
Secure Software Development Methodologies: A Multivocal Literature Review. CoRR abs/2211.16987 (2022) - 2021
- [c27]Nathan Daniel Schiele, Olga Gadyatskaya:
A Novel Approach for Attack Tree to Attack Graph Transformation. CRiSIS 2021: 74-90 - [e2]Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, Chunhua Su, Cong Wang:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [i6]Nathan Daniel Schiele, Olga Gadyatskaya:
A Novel Approach for Attack Tree to Attack Graph Transformation: Extended Version. CoRR abs/2110.02553 (2021) - 2020
- [j5]Ahto Buldas, Olga Gadyatskaya, Aleksandr Lenin, Sjouke Mauw, Rolando Trujillo-Rasua:
Attribute evaluation on attack trees with incomplete information. Comput. Secur. 88 (2020) - [j4]Aleksandr Pilgun, Olga Gadyatskaya, Yury Zhauniarovich, Stanislav Dashevskyi, Artsiom Kushniarou, Sjouke Mauw:
Fine-grained Code Coverage Measurement in Automated Black-box Android Testing. ACM Trans. Softw. Eng. Methodol. 29(4): 23:1-23:35 (2020) - [c26]Stanislav Dashevskyi, Yury Zhauniarovich, Olga Gadyatskaya, Aleksandr Pilgun, Hamza Ouhssain:
Dissecting Android Cryptocurrency Miners. CODASPY 2020: 191-202 - [e1]Harley Eades III, Olga Gadyatskaya:
Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers. Lecture Notes in Computer Science 12419, Springer 2020, ISBN 978-3-030-62229-9 [contents]
2010 – 2019
- 2019
- [c25]Olga Gadyatskaya, Sjouke Mauw:
Attack-Tree Series: A Case for Dynamic Attack Tree Analysis. GraMSec@CSF 2019: 7-19 - [i5]Stanislav Dashevskyi, Yury Zhauniarovich, Olga Gadyatskaya, Aleksandr Pilgun, Hamza Ouhssain:
Dissecting Android Cryptocurrency Miners. CoRR abs/1905.02602 (2019) - 2018
- [c24]Aleksandr Pilgun, Olga Gadyatskaya, Stanislav Dashevskyi, Yury Zhauniarovich, Artsiom Kushniarou:
An Effective Android Code Coverage Tool. CCS 2018: 2189-2191 - [c23]Stanislav Dashevskyi, Olga Gadyatskaya, Aleksandr Pilgun, Yury Zhauniarovich:
The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android. CCS 2018: 2216-2218 - [i4]Aleksandr Pilgun, Olga Gadyatskaya, Stanislav Dashevskyi, Yury Zhauniarovich, Artsiom Kushniarou:
Fine-grained Code Coverage Measurement in Automated Black-box Android Testing. CoRR abs/1812.10729 (2018) - [i3]Ahto Buldas, Olga Gadyatskaya, Aleksandr Lenin, Sjouke Mauw, Rolando Trujillo-Rasua:
Attribute Evaluation on Attack Trees with Incomplete Information. CoRR abs/1812.10754 (2018) - 2017
- [c22]Olga Gadyatskaya, Rolando Trujillo-Rasua:
New Directions in Attack Tree Research: Catching up with Industrial Needs. GraMSec@CSF 2017: 115-126 - [c21]Olga Gadyatskaya, Ravi Jhawar, Sjouke Mauw, Rolando Trujillo-Rasua, Tim A. C. Willemse:
Refinement-Aware Generation of Attack Trees. STM 2017: 164-179 - 2016
- [c20]Olga Gadyatskaya, Katsiaryna Labunets, Federica Paci:
Towards Empirical Evaluation of Automated Risk Assessment Methods. CRiSIS 2016: 77-86 - [c19]Olga Gadyatskaya, Carlo Harpes, Sjouke Mauw, Cédric Muller, Steve Muller:
Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees. GraMSec@CSF 2016: 80-93 - [c18]Olga Gadyatskaya, René Rydhof Hansen, Kim Guldstrand Larsen, Axel Legay, Mads Chr. Olesen, Danny Bøgsted Poulsen:
Modelling Attack-defense Trees Using Timed Automata. FORMATS 2016: 35-50 - [c17]Marlon Fraile, Margaret Ford, Olga Gadyatskaya, Rajesh Kumar, Mariëlle Stoelinga, Rolando Trujillo-Rasua:
Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study. PoEM 2016: 326-334 - [c16]Olga Gadyatskaya, Andra-Lidia Lezza, Yury Zhauniarovich:
Evaluation of Resource-Based App Repackaging Detection in Android. NordSec 2016: 135-151 - [c15]Olga Gadyatskaya, Ravi Jhawar, Piotr Kordy, Karim Lounis, Sjouke Mauw, Rolando Trujillo-Rasua:
Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0. QEST 2016: 159-162 - [c14]Yury Zhauniarovich, Olga Gadyatskaya:
Small Changes, Big Changes: An Updated View on the Android Permission System. RAID 2016: 346-367 - 2015
- [c13]Yury Zhauniarovich, Anton Philippov, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci:
Towards Black Box Testing of Android Apps. ARES 2015: 501-510 - [c12]Yury Zhauniarovich, Maqsood Ahmad, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci:
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. CODASPY 2015: 37-48 - [c11]Olga Gadyatskaya:
How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems. GraMSec@CSF 2015: 50-65 - [i2]Olga Gadyatskaya:
How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems. CoRR abs/1509.00643 (2015) - 2014
- [j3]Olga Gadyatskaya, Fabio Massacci, Yury Zhauniarovich:
Security in the Firefox OS and Tizen Mobile Platforms. Computer 47(6): 57-63 (2014) - [c10]Martina de Gramatica, Fabio Massacci, Olga Gadyatskaya:
An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects. CSP Forum 2014: 159-170 - [c9]Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo, Francesco La Spina, Ermanno Moser:
FSquaDRA: Fast Detection of Repackaged Applications. DBSec 2014: 130-145 - 2013
- [j2]Olga Gadyatskaya, Fabio Massacci, Quang Huy Nguyen, Boutheina Chetali:
Load time code validation for mobile phone Java Cards. J. Inf. Secur. Appl. 18(2-3): 108-129 (2013) - [c8]Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo:
Enabling trusted stores for android. CCS 2013: 1345-1348 - [i1]Minh Ngo, Fabio Massacci, Olga Gadyatskaya:
MAP-REDUCE Runtime Enforcement of Information Flow Policies. CoRR abs/1305.2136 (2013) - 2012
- [j1]Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci, Anton Philippov:
High-level algorithms and data structures requirements for security-by-contract on Java cards. Int. J. Crit. Comput. Based Syst. 3(4): 284-304 (2012) - [c7]Olga Gadyatskaya, Fabio Massacci:
Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract. FMCO 2012: 197-215 - [c6]Olga Gadyatskaya, Fabio Massacci, Anton Philippov:
Security-by-Contract for the OSGi Platform. SEC 2012: 364-375 - 2011
- [c5]Olga Gadyatskaya, Eduardo Lostal, Fabio Massacci:
Load Time Security Verification. ICISS 2011: 250-264 - [c4]Nicola Dragoni, Eduardo Lostal, Olga Gadyatskaya, Fabio Massacci, Federica Paci:
A Load Time Policy Checker for Open Multi-application Smart Cards. POLICY 2011: 153-156 - 2010
- [c3]Olga Gadyatskaya, Fabio Massacci, Federica Paci, Sergey A. Stankevich:
Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications. NordSec 2010: 187-192 - [c2]Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci:
Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? WISTP 2010: 221-228
2000 – 2009
- 2008
- [c1]Olga Gadyatskaya, Alexey S. Rodionov, Olga K. Rodionova:
Using EDP-Polynomials for Network Structure Optimization. ICCSA (2) 2008: 1061-1076
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 01:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint