Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending UTP 2 with cascading arbitration specifications., , and . A-TEST@ESEC/SIGSOFT FSE, page 8-14. ACM, (2019)Fuzzing of Mobile Application in the Banking Domain: a Case Study., , , and . QRS Companion, page 485-491. IEEE, (2020)Evolution of the UML Interactions Metamodel., , and . MoDELS, volume 8107 of Lecture Notes in Computer Science, page 405-421. Springer, (2013)Risk-based testing of Bluetooth functionality in an automotive environment., , , , , , and . Automotive - Safety & Security, volume P-210 of LNI, page 211-228. GI, (2012)Towards a certification scheme for IoT security evaluation., , , , and . GI-Jahrestagung, volume P-314 of LNI, page 1789-1796. Gesellschaft für Informatik, Bonn, (2021)Combining Risk Analysis and Security Testing., , , and . ISoLA (2), volume 8803 of Lecture Notes in Computer Science, page 322-336. Springer, (2014)Systematic Analysis of Practical Issues in Test Automation for Communication Based Systems., , and . ICST Workshops, page 250-256. IEEE Computer Society, (2016)Extending the UML Testing Profile with a Fine-Grained Test Logging Model., , , and . ICST Workshops, page 257-266. IEEE Computer Society, (2018)Towards an Empirical Robustness Assessment Through Measuring Adversarial Subspaces., , and . AST@ICSE, page 120-124. ACM, (2024)Model-Based Security Testing, , and . MBT, volume 80 of EPTCS, page 1-12. (2012)