Author of the publication

An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture.

, , , , , and . DSN Workshops, page 222-225. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trusted Software Repair for System Resiliency., , , , and . DSN Workshops, page 238-241. IEEE Computer Society, (2016)Continuous mission-oriented assessment (CMA) of assurance., , , and . DSN Workshops, page 33-38. IEEE Computer Society, (2011)Cyber Security Resource Allocation: A Markov Decision Process Approach., , , , and . HASE, page 49-52. IEEE Computer Society, (2017)An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture., , , , , and . DSN Workshops, page 222-225. IEEE Computer Society, (2016)Energy-Efficient Replica Voting Mechanisms for Secure Real-Time Embedded Systems., , and . WOWMOM, page 153-162. IEEE Computer Society, (2005)Applying distributed optimization for QoS-security tradeoff in a distributed information system., , , , and . AAMAS, page 1261-1262. IFAAMAS, (2013)START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report)., , , , , , , , , and 3 other author(s). ISSRE, page 73-84. IEEE, (2022)Models of dynamic relations among service activities, system state and service quality on computer and network systems., , , , , , and . Inf. Knowl. Syst. Manag., 9 (2): 99-116 (2010)Benefits of NoSQL databases for portals & science gateways., , , , , and . TG, page 36:1. ACM, (2011)Trusted Mission Operation - Concept and Implementation., , , , and . RV, volume 10548 of Lecture Notes in Computer Science, page 416-423. Springer, (2017)