Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dependable mesh networking patterns., , , , and . EuroPLoP, page 25:1-25:14. ACM, (2019)Software-Based Fault Recovery via Adaptive Diversity for COTS Multi-Core Processors., , , , and . CoRR, (2015)Towards Integrated Quantitative Security and Safety Risk Assessment., , , and . SAFECOMP Workshops, volume 11699 of Lecture Notes in Computer Science, page 102-116. Springer, (2019)Towards a security-driven automotive development lifecycle., , , , and . J. Softw. Evol. Process., (August 2023)Automotive Real-time Operating Systems: A Model-Based Configuration Approach., , , and . EWiLi, volume 1291 of CEUR Workshop Proceedings, CEUR-WS.org, (2014)Measuring trust in automated driving using a multi-level approach to human factors*., , , , , and . DSD, page 410-417. IEEE, (2021)Towards Dependable Integration Concepts for AI-Based Systems., , , and . SAFECOMP Workshops, volume 14182 of Lecture Notes in Computer Science, page 108-117. Springer, (2023)Triggering Conditions Analysis and Use Case for Validation of ADAS/ADS Functions., , , , and . SAFECOMP Workshops, volume 13415 of Lecture Notes in Computer Science, page 11-22. Springer, (2022)A Lean Automotive E/E-System Design Approach with Integrated Requirements Management Capability., , , and . ECSA, volume 9278 of Lecture Notes in Computer Science, page 251-258. Springer, (2015)ThreatGet: Ensuring the Implementation of Defense-in-Depth Strategy for IIoT Based on IEC 62443., , and . ICPS, page 1-6. IEEE, (2022)