Author of the publication

Integration Analysis of a Transmission Unit for Automated Driving Vehicles.

, , , , , and . SAFECOMP Workshops, volume 11094 of Lecture Notes in Computer Science, page 290-301. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dependable mesh networking patterns., , , , and . EuroPLoP, page 25:1-25:14. ACM, (2019)Software-Based Fault Recovery via Adaptive Diversity for COTS Multi-Core Processors., , , , and . CoRR, (2015)Towards a security-driven automotive development lifecycle., , , , and . J. Softw. Evol. Process., (August 2023)Towards Integrated Quantitative Security and Safety Risk Assessment., , , and . SAFECOMP Workshops, volume 11699 of Lecture Notes in Computer Science, page 102-116. Springer, (2019)Automotive Cybersecurity Engineering Job Roles and Best Practices - Developed for the EU Blueprint Project DRIVES., , , , , , and . EuroSPI, volume 1251 of Communications in Computer and Information Science, page 499-510. Springer, (2020)Consistency of Cybersecurity Process and Product Assessments in the Automotive Domain., , , , , , , and . EuroSPI (1), volume 1890 of Communications in Computer and Information Science, page 343-355. Springer, (2023)A Seamless Self-configuring EtherCAT Master Redundancy Protocol., , , , and . EuroSPI, volume 1251 of Communications in Computer and Information Science, page 381-395. Springer, (2020)Automotive Cybersecurity - Training the Future., , , , , , , , , and 1 other author(s). EuroSPI, volume 1442 of Communications in Computer and Information Science, page 211-219. Springer, (2021)First Experiences with the Automotive SPICE for Cybersecurity Assessment Model., , , , , , and . EuroSPI, volume 1442 of Communications in Computer and Information Science, page 531-547. Springer, (2021)ThreatGet: Ensuring the Implementation of Defense-in-Depth Strategy for IIoT Based on IEC 62443., , and . ICPS, page 1-6. IEEE, (2022)