Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Event-B Model of an Automotive Adaptive Exterior Light System., , and . ABZ, volume 12071 of Lecture Notes in Computer Science, page 351-366. Springer, (2020)Statistical Approach For Cloud Security: Microsoft Office 365 audit logs case study., , , , , and . DSN Workshops, page 15-18. IEEE, (2021)A Four-concern-oriented Secure IS Development Approach., , , , , , and . SECRYPT, page 464-471. SciTePress, (2011)Extended Algebraic State-Transition Diagrams., , , and . ICECCS, page 146-155. IEEE Computer Society, (2018)A SAT-Based Approach for the Construction of Reusable Control System Components., , , and . FMICS, volume 6959 of Lecture Notes in Computer Science, page 52-67. Springer, (2011)Formalizing COSMIC-FFP Using ROOM., , and . AICCSA, page 312-. IEEE Computer Society, (2001)Formal Modeling for Deploying Improvement and Innovation in Information Technology., and . KMIS, page 318-323. INSTICC Press, (2009)Assessment of a Formal Requirements Modeling Approach on a Transportation System., , , , , and . ICFEM, volume 11852 of Lecture Notes in Computer Science, page 470-486. Springer, (2019)Comparison of Model Checking Tools for Information Systems., , , , and . ICFEM, volume 6447 of Lecture Notes in Computer Science, page 581-596. Springer, (2010)Refinement of eb 3 Process Patterns into B Specifications, , and . (2006)