From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mechanical verification of the IEEE 1394a root contention protocol using Uppaal2k., и . Int. J. Softw. Tools Technol. Transf., 3 (4): 469-485 (2001)Efficient and Generic Algorithms for Quantitative Attack Tree Analysis., , и . IEEE Trans. Dependable Secur. Comput., 20 (5): 4169-4187 (сентября 2023)Automatic Inference of Fault Tree Models Via Multi-Objective Evolutionary Algorithms., , , и . IEEE Trans. Dependable Secur. Comput., 20 (4): 3317-3327 (июля 2023)Attack time analysis in dynamic attack trees via integer linear programming., и . CoRR, (2021)Model-based joint analysis of safety and security:Survey and identification of gaps., , , и . Comput. Sci. Rev., (ноября 2023)Model-Based Testing of Probabilistic Systems., и . FASE, том 9633 из Lecture Notes in Computer Science, стр. 251-268. Springer, (2016)Green Computing: Power Optimisation of VFI-Based Real-Time Multiprocessor Dataflow Applications., , , и . DSD, стр. 271-275. IEEE Computer Society, (2015)A Model-Driven Framework for Hardware-Software Co-design of Dataflow Applications., , , и . CyPhy, том 10107 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2016)LOCKS: a property specification language for security goals., , и . SAC, стр. 1907-1915. ACM, (2018)Ioco Theory for Probabilistic Automata., и . MBT, том 180 из EPTCS, стр. 23-40. (2015)