Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combining Risk Analysis and Security Testing., , , and . ISoLA (2), volume 8803 of Lecture Notes in Computer Science, page 322-336. Springer, (2014)Testing hybrid control systems with TTCN-3: an overview on continuous TTCN-3., and . Int. J. Softw. Tools Technol. Transf., 10 (4): 383-400 (2008)Wiederverwendbarkeit und Management von modellbasierten X-in-the-Loop Tests mit TTCN-3 Embedded., and . Softwaretechnik-Trends, (2010)Test von verteilten C2X-Applikationen., , , , , and . GI Jahrestagung (2), volume P-176 of LNI, page 491-496. GI, (2010)Risk-based testing of Bluetooth functionality in an automotive environment., , , , , , and . Automotive - Safety & Security, volume P-210 of LNI, page 211-228. GI, (2012)Establishing a Service-Oriented Tool Chain for the Development of Domain-Independent MBT Scenarios., , and . ECBS, page 329-334. IEEE Computer Society, (2010)Model-Based Testing: Trends., , and . Encyclopedia of Software Engineering, Taylor & Francis, (2010)Security Testing Approaches - For Research, Industry and Standardization., , and . ISCTCS, volume 426 of Communications in Computer and Information Science, page 397-406. Springer, (2013)Exploring new window manipulation techniques., , , and . OZCHI, volume 411 of ACM International Conference Proceeding Series, page 177-183. ACM, (2009)DIAMONDS do IT with MODELS: Innovative Security Testing Approaches., , and . ERCIM News, (2012)