Author of the publication

How Secure Is ERTMS?

, , , and . SAFECOMP Workshops, volume 7613 of Lecture Notes in Computer Science, page 247-258. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Theoretical foundation for iterative assessment of conditional confidence measures in the framework of conditional measure theoretic-approach., , , , and . EUSFLAT Conf., page 422-423. De Montfort University, Leicester, UK, (2001)Software criticality analysis of COTS/SOUP., , , and . Reliab. Eng. Syst. Saf., 81 (3): 291-301 (2003)Software Criticality Analysis of COTS/SOUP., , , and . SAFECOMP, volume 2434 of Lecture Notes in Computer Science, page 198-211. Springer, (2002)Evidence-Based Security in Aerospace: From Safety to Security and Back Again., , , and . ISSRE Workshops, page 21-22. IEEE Computer Society, (2012)Tool Support for Assurance Case Building Blocks - Providing a Helping Hand with CAE., , and . SAFECOMP Workshops, volume 9338 of Lecture Notes in Computer Science, page 62-71. Springer, (2015)Resilient to the Unexpected.. IEEE Secur. Priv., 9 (3): 3-4 (2011)Process Modelling to Support Dependability Arguments., and . DSN, page 113-122. IEEE Computer Society, (2002)Assurance Cases for Security: The Metrics Challenge., , , , and . DSN, page 807-808. IEEE Computer Society, (2007)OutMet: A new metric for prioritising intrusion alerts using correlation and outlier analysis., , , , and . LCN, page 322-330. IEEE Computer Society, (2014)A conservative theory for long term reliability growth prediction., and . ISSRE, page 308-317. IEEE Computer Society, (1996)