Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VERDICT: A Language and Framework for Engineering Cyber Resilient and Safe System., , , , , , , , , and 5 other author(s). Syst., 9 (1): 18 (2021)Automating the Assembly of Security Assurance Case Fragments., , , , and . SAFECOMP, volume 12852 of Lecture Notes in Computer Science, page 101-114. Springer, (2021)Towards Developing Trusted Smart Contracts in Simulink., , , , , , and . PoEM Workshops, volume 2749 of CEUR Workshop Proceedings, page 35-46. CEUR-WS.org, (2020)Formally Verifying Deep Reinforcement Learning Controllers with Lyapunov Barrier Certificates., , , , , , , , , and 2 other author(s). CoRR, (2024)Formal Methods in Requirements Engineering: Survey and Future Directions., , , , , , , and . FormaliSE@ICSE, page 88-99. ACM, (2024)Towards a Correct-by-Construction Design of Integrated Modular Avionics., , , , , , , , , and 2 other author(s). FMCAD, page 221-227. IEEE, (2023)Synthesis of Optimal Defenses for System Architecture Design Model in MaxSMT., , , , , and . NFM, volume 13260 of Lecture Notes in Computer Science, page 752-770. Springer, (2022)Model-Based Security Analysis in Additive Manufacturing Systems., , , , , , , and . AMSec@CCS, page 3-13. ACM, (2022)