From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Model-Based Evaluation of the Resilience of Critical Infrastructures Under Cyber Attacks., , и . CRITIS, том 8985 из Lecture Notes in Computer Science, стр. 231-243. Springer, (2014)Reliability Assessment of Legacy Safety-Critical Systems Upgraded with Off-the-Shelf Components.. SAFECOMP, том 2434 из Lecture Notes in Computer Science, стр. 139-150. Springer, (2002)Stochastic Modeling of Safety and Security of the e-Motor, an ASIL-D Device.. SAFECOMP, том 9337 из Lecture Notes in Computer Science, стр. 385-399. Springer, (2015)Evaluation of Confidence-based Ensembling in Deep Learning Image Classification., , и . CoRR, (2023)A conservative bound for the probability of failure of a 1-out-of-2 protection system with one hardware-only and one software-based protection train., , , , , и . Reliab. Eng. Syst. Saf., (2014)Estimating Bounds on the Reliability of Diverse Systems., , , и . IEEE Trans. Software Eng., 29 (4): 345-359 (2003)Intelligent Multi-Agent System for Improving the Quality of Software by Taking into Account the Information of the Subject Area at All Stages of its Development., , , и . IDAACS, стр. 548-551. IEEE, (2021)Choosing Effective Methods for Design Diversity - How to Progress from Intuition to Science., , и . SAFECOMP, том 1698 из Lecture Notes in Computer Science, стр. 272-285. Springer, (1999)The effect of testing on the reliability of single version and 1-out-of-2 software systems., и . ISSRE, стр. 219-228. IEEE Computer Society, (1995)Using Structured Assurance Case Approach to Analyse Security and Reliability of Critical Infrastructures., , , и . SAFECOMP Workshops, том 9338 из Lecture Notes in Computer Science, стр. 345-354. Springer, (2015)