Author of the publication

Expressing Iterative Properties Logically in a Symbolic Setting.

, , and . AMAST, volume 3116 of Lecture Notes in Computer Science, page 460-474. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reasoning about XACML policies using CSP.. SWS, page 28-35. ACM, (2005)A Proof-Based Method for Modelling Timed Systems., and . Ershov Memorial Conference, volume 8974 of Lecture Notes in Computer Science, page 161-176. Springer, (2014)Dimensions of dynamic coalitions, , , , , , , and . (2006)Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study., , , and . DSN Workshops, page 36-43. IEEE Computer Society, (2017)Informing decision makers: facilitating communication and trust for decision makers during crises., , , , and . ISCRAM, ISCRAM Association, (2018)Access control and view generation for provenance graphs., , , and . Future Gener. Comput. Syst., (2015)Stochastic Specification and Verification., and . IWFM, BCS, (1999)A formal framework for security testing of automotive over-the-air update systems., , , , and . J. Log. Algebraic Methods Program., (2023)Specification and Analysis of Automata-Based Designs., , , and . IFM, volume 1945 of Lecture Notes in Computer Science, page 176-193. Springer, (2000)Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows., , , and . DSN Workshops, page 231-238. IEEE Computer Society, (2018)