Author of the publication

Modelling Attack-defense Trees Using Timed Automata.

, , , , , and . FORMATS, volume 9884 of Lecture Notes in Computer Science, page 35-50. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelling Attack-defense Trees Using Timed Automata., , , , , and . FORMATS, volume 9884 of Lecture Notes in Computer Science, page 35-50. Springer, (2016)THAPS: Automated Vulnerability Scanning of PHP Applications., , , and . NordSec, volume 7617 of Lecture Notes in Computer Science, page 31-46. Springer, (2012)opaal: A Lattice Model Checker., , , , , , and . NASA Formal Methods, volume 6617 of Lecture Notes in Computer Science, page 487-493. Springer, (2011)Formal Methods for Modelling and Analysis of Single-Event Upsets., , , and . IRI, page 287-294. IEEE Computer Society, (2015)What is a Timing Anomaly?., , and . WCET, volume 23 of OASIcs, page 1-12. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2012)METAMOC: Modular Execution Time Analysis using Model Checking., , , , and . WCET, volume 15 of OASIcs, page 113-123. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, (2010)Coccinelle: Tool support for automated CERT C Secure Coding Standard certification., , , and . Sci. Comput. Program., (2014)Extended Dependency Graphs and Efficient Distributed Fixed-Point Computation., , , , , , , , , and 1 other author(s). Petri Nets, volume 10258 of Lecture Notes in Computer Science, page 139-158. Springer, (2017)