Author of the publication

Refinement of Systems with an Attacker Focus.

, , and . FMICS, volume 14290 of Lecture Notes in Computer Science, page 96-112. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verified Verifying: SMT-LIB for Strings in Isabelle., , , , and . CIAA, volume 14151 of Lecture Notes in Computer Science, page 206-217. Springer, (2023)Importance Splitting in Uppaal., , , and . ISoLA (3), volume 13703 of Lecture Notes in Computer Science, page 433-447. Springer, (2022)Refinement of Systems with an Attacker Focus., , and . FMICS, volume 14290 of Lecture Notes in Computer Science, page 96-112. Springer, (2023)Practical controller synthesis for MTL0, ∞., , , , and . SPIN, page 102-111. ACM, (2017)Solving String Theories Involving Regular Membership Predicates Using SAT., , , and . SPIN, volume 13255 of Lecture Notes in Computer Science, page 134-151. Springer, (2022)Rule-based Word Equation Solving., , , , and . FormaliSE@ICSE, page 87-97. ACM, (2020)Preliminary Security Analysis, Formalisation, and Verification of OpenTitan Secure Boot Code., , , , , , , , , and 2 other author(s). NordSec, volume 13115 of Lecture Notes in Computer Science, page 192-211. Springer, (2021)Modelling Attack-defense Trees Using Timed Automata., , , , , and . FORMATS, volume 9884 of Lecture Notes in Computer Science, page 35-50. Springer, (2016)Modelling and Analysis of DTLS: Power Consumption and Attacks., , , , , , , , and . FMICS, volume 14952 of Lecture Notes in Computer Science, page 136-151. Springer, (2024)Statistical Model Checking of LLVM Code., , , and . FM, volume 10951 of Lecture Notes in Computer Science, page 542-549. Springer, (2018)