Author of the publication

Towards Model Co-evolution Across Self-Adaptation Steps for Combined Safety and Security Analysis.

, , , , , and . SEAMS, page 106-112. ACM/IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Pekaric, Irdin
add a person with the name Pekaric, Irdin
 

Other publications of authors with the same name

Applying Security Testing Techniques to Automotive Engineering., , and . ARES, page 61:1-61:10. ACM, (2019)An analysis and classification of public information security data sources used in research and practice., , , and . Comput. Secur., (2019)A systematic review on security and safety of self-adaptive systems., , , , , , and . J. Syst. Softw., (September 2023)Towards Model Co-evolution Across Self-Adaptation Steps for Combined Safety and Security Analysis., , , , , and . SEAMS, page 106-112. ACM/IEEE, (2022)Understanding the Process of Data Labeling in Cybersecurity., , and . SAC, page 1596-1605. ACM, (2024)Simulation of Sensor Spoofing Attacks on Unmanned Aerial Vehicles using the Gazebo Simulator., , and . QRS Companion, page 44-53. IEEE, (2022)Research Challenges in Empowering Agile Teams with Security Knowledge Based on Public and Private Information Sources., and . SecSE@ESORICS, volume 1977 of CEUR Workshop Proceedings, page 1-7. CEUR-WS.org, (2017)How is security testing done in agile teams? A cross-case analysis of four software teams., , , , and . SE/SWM, volume P-292 of LNI, page 133-134. GI, (2019)Streamlining Attack Tree Generation: A Fragment-Based Approach., , , , , , , and . CoRR, (2023)Streamlining Attack Tree Generation: A Fragment-Based Approach., , , , , , , and . HICSS, page 7447-7456. ScholarSpace, (2024)