Author of the publication

Investigating Attack Propagation in a SoS via a Service Decomposition.

, , and . SERVICES, page 9-14. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Interplay of Business Process Modeling and Missions in Systems-of-Information Systems., , , and . JSOS@ICSE, page 72-73. IEEE Computer Society, (2017)Towards Model Driven Architecture and Analysis of System of Systems Access Control.. ICSE (2), page 867-870. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).Towards methodological support for secure architectures of software-intensive systems-of-systems., , , and . SiSoS@ECSA, page 9:1-9:6. ACM, (2016)Modeling, analyzing and predicting security cascading attacks in smart buildings systems-of-systems., , , , and . J. Syst. Softw., (2020)ICSE 2015 SIGSOFT CAPS Report.. ACM SIGSOFT Softw. Eng. Notes, 40 (4): 28 (2015)An Asset-Based Assistance for Secure by Design., , , , , and . APSEC, page 178-187. IEEE, (2020)Securing system-of-systems through a game theory approach., , and . SAC, page 1443-1446. ACM, (2021)Ensuring Requirements Confidentiality during System Design Modelling., , and . SAC, page 1178-1179. ACM, (2024)Towards the Integration of Cybersecurity Risk Assessment into Model-based Requirements Engineering., , , , and . RE, page 334-344. IEEE, (2021)Asset-Oriented Threat Modeling., , , , , and . TrustCom, page 491-501. IEEE, (2020)