Author of the publication

Specification and Analysis of Automata-Based Designs.

, , , and . IFM, volume 1945 of Lecture Notes in Computer Science, page 176-193. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reasoning about XACML policies using CSP.. SWS, page 28-35. ACM, (2005)A comparative analysis of multi-criteria decision methods for secure beacon selection in vehicular platoons., , , , , and . Trans. Emerg. Telecommun. Technol., (November 2023)A Proof-Based Method for Modelling Timed Systems., and . Ershov Memorial Conference, volume 8974 of Lecture Notes in Computer Science, page 161-176. Springer, (2014)Dimensions of dynamic coalitions, , , , , , , and . (2006)Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study., , , and . DSN Workshops, page 36-43. IEEE Computer Society, (2017)Informing decision makers: facilitating communication and trust for decision makers during crises., , , , and . ISCRAM, ISCRAM Association, (2018)Stochastic Specification and Verification., and . IWFM, BCS, (1999)Using a one-class compound classifier to detect in-vehicle network attacks., , and . GECCO (Companion), page 1926-1929. ACM, (2018)Formal Template-Based Generation of Attack-Defence Trees for Automated Security Analysis., , , , and . Inf., 14 (9): 481 (2023)A formal framework for security testing of automotive over-the-air update systems., , , , and . J. Log. Algebraic Methods Program., (2023)