Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs., and . ICISSP (Revised Selected Papers), volume 977 of Communications in Computer and Information Science, page 240-260. Springer, (2018)Accurate Reasoning Using Imperfect Digital Twins: A Steel Industry Case Study., , and . ERCIM News, (2018)Co-engineering Security and Safety Requirements for Cyber-Physical Systems., , and . ERCIM News, (2016)A Constraint-Solving Approach for Achieving Minimal-Reset Transition Coverage of Smartcard Behaviour., , and . ECEASST, (2014)Combining Process Guidance and Industrial Feedback for Successfully Deploying Big Data Projects., , and . Open J. Big Data, 3 (1): 26-41 (2017)Verification of Scenario-based Behavioural Models using Capella and PyNuSMV., , and . MODELSWARD, page 337-343. SCITEPRESS, (2021)Goal and Threat Modelling for Driving Automotive Cybersecurity Risk Analysis Conforming to ISO/SAE 21434., , and . SECRYPT, page 833-838. SCITEPRESS, (2021)Synthèse des méthodes de conduite de projets Big Data et des retours collectés lors de pilotes industriels., , and . Ingénierie des Systèmes d Inf., 23 (1): 9-33 (2018)Guiding Cloud Developers to Build Energy Aware Applications., , and . ICSOFT (Selected Papers), volume 586 of Communications in Computer and Information Science, page 397-414. Springer, (2015)Improving Requirements Engineering through Goal-oriented Models and Tools: Feedback from a Large Industrial Deployment., and . ICSOFT, page 372-381. SciTePress, (2017)