Author of the publication

A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks.

, , , , and . ICFEM, volume 10009 of Lecture Notes in Computer Science, page 141-158. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Augmenting formal development of control systems with quantitative reliability assessment., , and . SERENE, page 61-70. ACM, (2010)Functional Procedures in Higher-Order Logic., and . TPHOLs, volume 1869 of Lecture Notes in Computer Science, page 372-387. Springer, (2000)Formal Development of Critical Multi-agent Systems: A Refinement Approach., , and . EDCC, page 156-161. IEEE Computer Society, (2012)Formal Derivation of Distributed MapReduce., , , , and . ABZ, volume 8477 of Lecture Notes in Computer Science, page 238-254. Springer, (2014)Modelling Resilient Systems-of-Systems in Event-B., , and . SAFECOMP Workshops, volume 8696 of Lecture Notes in Computer Science, page 157-166. Springer, (2014)The SafeCap Trajectory: Industry-Driven Improvement of an Interlocking Verification Tool., , , and . RSSRail, volume 14198 of Lecture Notes in Computer Science, page 117-127. Springer, (2023)Quantitative Validation of Formal Domain Models., , and . HASE, page 17-24. IEEE, (2019)Formal Service-Oriented Development of Fault Tolerant Communicating Systems., , , , and . RODIN Book, volume 4157 of Lecture Notes in Computer Science, page 261-287. Springer, (2006)Formal Model-Driven Development of Communicating Systems, , , , and . (2005)Formal Modelling of Resilient Data Storage in Cloud., , , , and . ICFEM, volume 8144 of Lecture Notes in Computer Science, page 363-379. Springer, (2013)