Author of the publication

Leadership Election: An Industrial SoS Application of Compositional Deadlock Verification.

, , , , and . NASA Formal Methods, volume 8430 of Lecture Notes in Computer Science, page 31-45. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dimensions of dynamic coalitions, , , , , , , and . (2006)A Proof-Based Method for Modelling Timed Systems., and . Ershov Memorial Conference, volume 8974 of Lecture Notes in Computer Science, page 161-176. Springer, (2014)Informing decision makers: facilitating communication and trust for decision makers during crises., , , , and . ISCRAM, ISCRAM Association, (2018)Reasoning about XACML policies using CSP.. SWS, page 28-35. ACM, (2005)Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study., , , and . DSN Workshops, page 36-43. IEEE Computer Society, (2017)Specification and Analysis of Automata-Based Designs., , , and . IFM, volume 1945 of Lecture Notes in Computer Science, page 176-193. Springer, (2000)Stochastic Specification and Verification., and . IWFM, BCS, (1999)Access control and view generation for provenance graphs., , , and . Future Gener. Comput. Syst., (2015)A formal framework for security testing of automotive over-the-air update systems., , , , and . J. Log. Algebraic Methods Program., (2023)Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows., , , and . DSN Workshops, page 231-238. IEEE Computer Society, (2018)