All Stories

  1. An LLM-based Approach to Recover Traceability Links between Security Requirements and Goal Models
  2. RPA-Code for Secure Binary Sequence Generation from Graph-Based Scanning
  3. EVSec: An Approach to Extract and Visualize Security Scenarios from System Logs
  4. Automated Identification of Security Requirements
  5. Applying Selective Mutation Strategies to the AsmetaL Language