Author of the publication

Behavioral Fuzzing Operators for UML Sequence Diagrams.

, , , , and . SAM, volume 7744 of Lecture Notes in Computer Science, page 88-104. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combining Risk Analysis and Security Testing., , , and . ISoLA (2), volume 8803 of Lecture Notes in Computer Science, page 322-336. Springer, (2014)Test von verteilten C2X-Applikationen., , , , , and . GI Jahrestagung (2), volume P-176 of LNI, page 491-496. GI, (2010)Risk-based testing of Bluetooth functionality in an automotive environment., , , , , , and . Automotive - Safety & Security, volume P-210 of LNI, page 211-228. GI, (2012)Establishing a Service-Oriented Tool Chain for the Development of Domain-Independent MBT Scenarios., , and . ECBS, page 329-334. IEEE Computer Society, (2010)Properties that allow or prohibit transferability of adversarial attacks among quantized networks., and . AST@ICSE, page 99-109. ACM, (2024)Modeling Property Based Stream Templates with TTCN-3., , and . TestCom/FATES, volume 5047 of Lecture Notes in Computer Science, page 70-85. Springer, (2008)CRSTIP - An Assessment Scheme for Security Assessment Processes., and . ISSRE Workshops, page 296-298. IEEE Computer Society, (2014)Architecture Driven Modernization in Practice - Study Results., , , , , , and . ICECCS, page 50-57. IEEE Computer Society, (2009)Model-Based Testing: Trends., , and . Encyclopedia of Software Engineering, Taylor & Francis, (2010)Security Testing Approaches - For Research, Industry and Standardization., , and . ISCTCS, volume 426 of Communications in Computer and Information Science, page 397-406. Springer, (2013)