Author of the publication

The Guided System Development Framework: Modeling and Verifying Communication Systems.

, , and . ISoLA (2), volume 8803 of Lecture Notes in Computer Science, page 509-523. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maintaining Arc Consistency in Non-Binary Dynamic CSPs using Simple Tabular Reduction., , and . STAIRS, volume 222 of Frontiers in Artificial Intelligence and Applications, page 251-263. IOS Press, (2010)Security audits of multi-tier virtual infrastructures in public infrastructure clouds., , , , and . CCSW, page 93-102. ACM, (2010)Modular Control Flow Analysis for Libraries.. SAS, volume 2477 of Lecture Notes in Computer Science, page 165-179. Springer, (2002)Attack Tree Analysis for Insider Threats on the IoT Using Isabelle., , and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 234-246. Springer, (2016)08302 Summary - Countering Insider Threats., , , and . Countering Insider Threats, volume 08302 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2008)05141 Summary - Power-aware Computing Systems., , , and . Power-aware Computing Systems, volume 05141 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, (2005)Fluid information systems., and . NSPW, page 125-132. ACM, (2009)Privacy with Good Taste - A Case Study in Quantifying Privacy Risks in Genetic Scores., , , , , , , and . DPM/CBT@ESORICS, volume 13619 of Lecture Notes in Computer Science, page 103-119. Springer, (2022)Addressing Insider Threats and Information Leakage., , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2 (1): 1-3 (2011)Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques., and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2 (1): 4-27 (2011)