Author of the publication

Automating Vehicle SOA Threat Analysis Using a Model-Based Methodology.

, , , , and . ICISSP, page 180-191. SciTePress, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the accuracy of formal verification of selective defenses for TDoS attacks., , , and . J. Log. Algebraic Methods Program., (2018)A Comparative Study Across Static and Dynamic Side-Channel Countermeasures., , and . FPS, volume 11358 of Lecture Notes in Computer Science, page 173-189. Springer, (2018)Slow TCAM Exhaustion DDoS Attack., , , and . SEC, volume 502 of IFIP Advances in Information and Communication Technology, page 17-31. Springer, (2017)A Selective Defense for Application Layer DDoS Attacks., , and . JISIC, page 75-82. IEEE, (2014)SeCloud: Computer-Aided Support for Selecting Security Measures for Cloud Architectures., and . ICISSP, page 264-275. SciTePress, (2023)A Model-based System Engineering Plugin for Safety Architecture Pattern Synthesis., , , , , , , , and . MODELSWARD, page 36-47. SCITEPRESS, (2022)Safety-Aware Deployment Synthesis and Trade-Off Analysis of Apollo Autonomous Driving Platform., , , , , and . ICSA-C, page 309-316. IEEE, (2023)Automating Vehicle SOA Threat Analysis Using a Model-Based Methodology., , , , and . ICISSP, page 180-191. SciTePress, (2023)A Formal Security Assessment Framework for Cooperative Adaptive Cruise Control., , and . VNC, page 1-8. IEEE, (2020)On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks., , , and . CoRR, (2017)