Author of the publication

Combining Security Risk Assessment and Security Testing Based on Standards.

, and . RISK, volume 9488 of Lecture Notes in Computer Science, page 18-33. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combining Risk Analysis and Security Testing., , , and . ISoLA (2), volume 8803 of Lecture Notes in Computer Science, page 322-336. Springer, (2014)Image Dataset Quality Assessment Through Descriptive Out-of-Distribution Detection., and . KI, volume 14992 of Lecture Notes in Computer Science, page 147-159. Springer, (2024)Test von verteilten C2X-Applikationen., , , , , and . GI Jahrestagung (2), volume P-176 of LNI, page 491-496. GI, (2010)Risk-based testing of Bluetooth functionality in an automotive environment., , , , , , and . Automotive - Safety & Security, volume P-210 of LNI, page 211-228. GI, (2012)Establishing a Service-Oriented Tool Chain for the Development of Domain-Independent MBT Scenarios., , and . ECBS, page 329-334. IEEE Computer Society, (2010)Properties that allow or prohibit transferability of adversarial attacks among quantized networks., and . AST@ICSE, page 99-109. ACM, (2024)Modeling Property Based Stream Templates with TTCN-3., , and . TestCom/FATES, volume 5047 of Lecture Notes in Computer Science, page 70-85. Springer, (2008)CRSTIP - An Assessment Scheme for Security Assessment Processes., and . ISSRE Workshops, page 296-298. IEEE Computer Society, (2014)Architecture Driven Modernization in Practice - Study Results., , , , , , and . ICECCS, page 50-57. IEEE Computer Society, (2009)Exploring new window manipulation techniques., , , and . OZCHI, volume 411 of ACM International Conference Proceeding Series, page 177-183. ACM, (2009)