Author of the publication

Coordinated Actors for Reliable Self-adaptive Systems.

, , , , , , and . FACS, volume 10231 of Lecture Notes in Computer Science, page 241-259. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification of Distributed Firewalls Configuration vs. Security Policies Using ALCQI(d)., and . Appl. Artif. Intell., 23 (10): 945-975 (2009)Formal modeling of evolving self-adaptive systems., , , , and . Sci. Comput. Program., 78 (1): 3-26 (2012)Notions of Conformance Testing for Cyber-Physical Systems: Overview and Roadmap (Invited Paper)., and . CONCUR, volume 42 of LIPIcs, page 18-40. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)Self-protection against business logic vulnerabilities., , , and . SEAMS@ICSE, page 174-180. ACM, (2020)Monitoring safety properties of composite web services at runtime using CSP., , , and . EDOCW, page 107-113. IEEE Computer Society, (2009)Partially-Observable Security Games for Automating Attack-Defense Analysis., and . CoRR, (2022)Foundations., , , , , , , , , and 3 other author(s). Composing Model-Based Analysis Tools, Springer, (2021)Security Countermeasure Selection for Component-Based Software-Intensive Systems., , and . QRS, page 63-72. IEEE, (2022)Security Risk Analysis of Multi-Stage Attacks based on Data Criticality., , , and . EnCyCriS@ICSE, page 13-20. IEEE, (2021)Supervisory Controller Synthesis for Safe Software Adaptation., , and . WODES, page 39-45. International Federation of Automatic Control, (2014)