Author of the publication

Application of Model-Based Safety Assessment to the Validation of Avionic Electrical Power Systems.

, , , and . IMBSA, volume 10437 of Lecture Notes in Computer Science, page 243-254. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Application of SMC to continuous validation of heterogeneous systems., , , , , , , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 4 (10): e3 (2017)Generation of Test Data Structures Using Constraint Logic Programming., and . TAP@TOOLS, volume 7305 of Lecture Notes in Computer Science, page 115-131. Springer, (2012)Sensitive information protection in blockchain-based supply-chain management for aerospace., , , and . COINS, page 1-8. IEEE, (2022)Towards a Formal Approach to Mobile Cloud Computing., , , , and . PDP, page 743-750. IEEE Computer Society, (2014)Application of Model-Based Safety Assessment to the Validation of Avionic Electrical Power Systems., , , and . IMBSA, volume 10437 of Lecture Notes in Computer Science, page 243-254. Springer, (2017)Homomorphic Encryption in Manufacturing Compliance Checks., , , , , and . TrustBus, volume 13582 of Lecture Notes in Computer Science, page 81-95. Springer, (2022)The Transformational Approach to Program Development., , and . 25 Years GULP, volume 6125 of Lecture Notes in Computer Science, Springer, (2010)Secure Remote Maintenance via Workflow-Driven Security Framework., , , , and . Blockchain, page 29-37. IEEE, (2021)On StocS: A Stochastic Extension of SCEL., , , and . Software, Services, and Systems, volume 8950 of Lecture Notes in Computer Science, page 619-640. Springer, (2015)Applying Mean-Field Approximation to Continuous Time Markov Chains., , , and . ROCKS, volume 8453 of Lecture Notes in Computer Science, page 242-280. Springer, (2012)