From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Was fehlt (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen für sichere Apps by Design., , , , и . PVM, том P-298 из LNI, стр. 247-252. Gesellschaft für Informatik e.V., (2019)Coaching on the Job bei Unternehmen des Maschinen- und Anlagenbaus., , , и . PVM, том P-298 из LNI, стр. 31-43. Gesellschaft für Informatik e.V., (2019)Specification and verification for real-time coordination protocols of cyber-physical systems.. University of Paderborn, Germany, (2017)Integrating Security Protocols in Scenario-based Requirements Specifications., , , и . MODELSWARD, стр. 15-25. SCITEPRESS, (2022)Coaching on the Job bei Unternehmen des Maschinenbaus., , , и . SE, том P-300 из LNI, стр. 201-207. Gesellschaft für Informatik e.V., (2020)Automata-based refinement checking for real-time systems., , , и . Comput. Sci. Res. Dev., 30 (3-4): 255-283 (2015)Scenario-based specification of security protocols and transformation to security model checkers., , , и . MoDELS, стр. 343-353. ACM, (2020)Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of their Product - An Experience Report., , , , , и . AMCIS, Association for Information Systems, (2024)How far are German companies in improving security through static program analysis tools?, , , , и . SecDev, стр. 7-15. IEEE, (2022)Specifying Intra-Component Dependencies for Synthesizing Component Behaviors., , и . ModComp@MoDELS, том 1281 из CEUR Workshop Proceedings, стр. 16-25. CEUR-WS.org, (2014)