Author of the publication

Detailed Analysis of Security Evaluation of Automotive Systems Based on JASO TP15002.

, , , and . SAFECOMP Workshops, volume 10489 of Lecture Notes in Computer Science, page 211-224. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model checking education for software engineers in Japan., , , , , and . ACM SIGCSE Bull., 41 (2): 45-50 (2009)Quantitative Analysis of Sparsely Synchronized Fail-Safe Processors., , and . QRS, page 1057-1068. IEEE, (2022)Comparing Risk Identification in Hazard Analysis and Threat Analysis., and . SAFECOMP Workshops, volume 11094 of Lecture Notes in Computer Science, page 265-277. Springer, (2018)A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design., , , , and . Secur. Commun. Networks, (2019)A Study on Threat Analysis and Risk Assessment Based on the Ässet Container" Method and CWSS., , , , and . IEEE Access, (2023)Detecting mastication by using microwave Doppler sensor., , , and . PETRA, volume 282 of ACM International Conference Proceeding Series, page 88. ACM, (2008)On Validating Attack Trees with Attack Effects., , , and . SAFECOMP, volume 12234 of Lecture Notes in Computer Science, page 309-324. Springer, (2020)Formal Specification Based Automatic Test Generation for Embedded Network Systems., , , , , , , and . J. Appl. Math., (2014)On Validating Attack Trees with Attack Effects: An Approach from Barwise-Seligman's Channel Theory., , , and . CoRR, (2022)Linking Traceability with GSN., , , and . ISSRE Workshops, page 192-197. IEEE Computer Society, (2014)