From post

A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property.

, , , и . FACS, том 10231 из Lecture Notes in Computer Science, стр. 134-152. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improving Vehicle Safety Through a Fog Collaborative Infrastructure., , , и . SMARTCOMP, стр. 446-451. IEEE Computer Society, (2018)Demo: CANDY CREAM., и . SAFECOMP Workshops, том 11699 из Lecture Notes in Computer Science, стр. 203-209. Springer, (2019)Elective temporal logic., и . QoSA/ISARCS, стр. 143-152. ACM, (2011)Partial Model Checking for the Verification and Synthesis of Secure Service Compositions., и . EuroPKI, том 8341 из Lecture Notes in Computer Science, стр. 1-11. Springer, (2013)Implementing CAN bus security by TOUCAN., , , и . MobiHoc, стр. 399-400. ACM, (2019)Efficient Detection of Conflicts in Data Sharing Agreements., , , и . ICISSP (Revised Selected Papers), том 867 из Communications in Computer and Information Science, стр. 148-172. Springer, (2017)A Uniform Approach to Security and Fault-Tolerance Specification and Analysis., , , и . WADS, том 5835 из Lecture Notes in Computer Science, стр. 172-201. Springer, (2008)CNL4DSA: a controlled natural language for data sharing agreements., , и . SAC, стр. 616-620. ACM, (2010)There are Two Sides to Every Question - Controller Versus Attacker., , и . Programming Languages with Applications to Biology and Security, том 9465 из Lecture Notes in Computer Science, стр. 304-318. Springer, (2015)CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem., , , , , и . TrustCom, стр. 1211-1218. IEEE, (2022)