Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AppSecure.nrw Software Security Study., , , , and . CoRR, (2021)Automata-based refinement checking for real-time systems., , , and . Comput. Sci. Res. Dev., 30 (3-4): 255-283 (2015)Scenario-based specification of security protocols and transformation to security model checkers., , , and . MoDELS, page 343-353. ACM, (2020)Was fehlt (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen für sichere Apps by Design., , , , and . PVM, volume P-298 of LNI, page 247-252. Gesellschaft für Informatik e.V., (2019)Coaching on the Job bei Unternehmen des Maschinen- und Anlagenbaus., , , and . PVM, volume P-298 of LNI, page 31-43. Gesellschaft für Informatik e.V., (2019)Specification and verification for real-time coordination protocols of cyber-physical systems.. University of Paderborn, Germany, (2017)Integrating Security Protocols in Scenario-based Requirements Specifications., , , and . MODELSWARD, page 15-25. SCITEPRESS, (2022)Coaching on the Job bei Unternehmen des Maschinenbaus., , , and . SE, volume P-300 of LNI, page 201-207. Gesellschaft für Informatik e.V., (2020)How far are German companies in improving security through static program analysis tools?, , , , and . SecDev, page 7-15. IEEE, (2022)Specifying Intra-Component Dependencies for Synthesizing Component Behaviors., , and . ModComp@MoDELS, volume 1281 of CEUR Workshop Proceedings, page 16-25. CEUR-WS.org, (2014)