Author of the publication

Investigating Attack Propagation in a SoS via a Service Decomposition.

, , and . SERVICES, page 9-14. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Interplay of Business Process Modeling and Missions in Systems-of-Information Systems., , , and . JSOS@ICSE, page 72-73. IEEE Computer Society, (2017)Towards Model Driven Architecture and Analysis of System of Systems Access Control.. ICSE (2), page 867-870. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).Towards methodological support for secure architectures of software-intensive systems-of-systems., , , and . SiSoS@ECSA, page 9:1-9:6. ACM, (2016)Asset-Oriented Threat Modeling., , , , , and . TrustCom, page 491-501. IEEE, (2020)Towards the Integration of Cybersecurity Risk Assessment into Model-based Requirements Engineering., , , , and . RE, page 334-344. IEEE, (2021)Model Driven Software Security Architecture of Systems-of-Systems., , , , and . APSEC, page 89-96. IEEE Computer Society, (2016)Modeling, analyzing and predicting security cascading attacks in smart buildings systems-of-systems., , , , and . J. Syst. Softw., (2020)Securing system-of-systems through a game theory approach., , and . SAC, page 1443-1446. ACM, (2021)An Asset-Based Assistance for Secure by Design., , , , , and . APSEC, page 178-187. IEEE, (2020)Ensuring Requirements Confidentiality during System Design Modelling., , and . SAC, page 1178-1179. ACM, (2024)