Author of the publication

Refinement of Systems with an Attacker Focus.

, , and . FMICS, volume 14290 of Lecture Notes in Computer Science, page 96-112. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Homotopy Bisimilarity for Higher-Dimensional Automata., and . CoRR, (2014)Search-based Similarity-driven Behavioural SPL Testing., , , , and . VaMoS, page 89-96. ACM, (2016)Towards statistical prioritization for software product lines testing., , , , , and . VaMoS, page 10:1-10:7. ACM, (2014)A Tag Contract Framework for Heterogeneous Systems., , , and . ESOCC Workshops, volume 393 of Communications in Computer and Information Science, page 204-217. Springer, (2013)PyEcdar: Towards Open Source Implementation for Timed Systems., and . ATVA, volume 8172 of Lecture Notes in Computer Science, page 460-463. Springer, (2013)Modal interfaces: unifying interface automata and modal specifications., , , , , and . EMSOFT, page 87-96. ACM, (2009)Sequential Relational Decomposition., , , and . CoRR, (2019)Model Checking the IKEv2 Protocol Using Spin., , , , and . PST, page 1-7. IEEE, (2019)Towards sampling and simulation-based analysis of featured weighted automata., , , and . FormaliSE@ICSE, page 61-64. IEEE / ACM, (2019)The Deviation Attack: A Novel Denial-of-Service Attack Against IKEv2., , , , and . TrustCom/BigDataSE, page 66-74. IEEE, (2019)