Author of the publication

On synergies of cyber and physical security modelling in vulnerability assessment of railway systems.

, , , , and . Comput. Electr. Eng., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advancements in knowledge elicitation for computer-based critical systems., , , and . Future Gener. Comput. Syst., (2020)Securing MQTT by Blockchain-Based OTP Authentication., , and . Sensors, 20 (7): 2002 (2020)Compositional modeling of railway Virtual Coupling with Stochastic Activity Networks., , , and . Formal Aspects Comput., 33 (6): 989-1007 (2021)Model-Driven V&V Processes for Computer Based Control Systems: A Unifying Perspective., , , , and . ISoLA (2), volume 7610 of Lecture Notes in Computer Science, page 190-204. Springer, (2012)A SAN-Based Modeling Approach to Performance Evaluation of an IMS-Compliant Conferencing Framework., , , , , and . Trans. Petri Nets Other Model. Concurr., (2012)Vulnerability analysis and modeling for critical infrastructure protection, , , , , , , and . Seventh annual IFIP working group 11.10 international conference on critical infrastructure protection, (2013)Software Verification and Validation of Safe Autonomous Cars: A Systematic Literature Review., , , and . IEEE Access, (2021)A Survey on Audio-Video Based Defect Detection Through Deep Learning in Railway Maintenance., , , , , , and . IEEE Access, (2022)A model-driven approach for vulnerability evaluation of modern physical protection systems., , , , , and . Softw. Syst. Model., 18 (1): 523-556 (2019)Computer-aided security assessment of water networks monitoring platforms., , , and . Int. J. Crit. Infrastructure Prot., (2020)