From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Threat Modeling for Cyber-Physical Systems: A Two-dimensional Taxonomy Approach for Structuring Attack Actions., , , , , и . ICSOFT, стр. 160-171. ScitePress, (2020)Distributed Frames: Pattern-Based Characterization of Functional Requirements for Distributed Systems., , и . ICSOFT (Selected Papers), том 1250 из Communications in Computer and Information Science, стр. 81-107. Springer, (2019)Creating Privacy Policies from Data-Flow Diagrams., , и . ESORICS Workshops (1), том 14398 из Lecture Notes in Computer Science, стр. 433-453. Springer, (2023)Pattern-Based Risk Identification for Model-Based Risk Management., и . Applicable Formal Methods for Safe Industrial Products, том 14165 из Lecture Notes in Computer Science, стр. 114-129. Springer, (2023)Model-Based Threat Modeling for Cyber-Physical Systems: A Computer-Aided Approach., , , , , и . ICSOFT (Selected Papers), том 1447 из Communications in Computer and Information Science, стр. 158-183. Springer, (2020)Pattern-based modeling of cyber-physical systems for analyzing security., , , , и . EuroPLoP, стр. 23:1-23:10. ACM, (2019)Model-Based Documentation of Architectures for Cloud-Based Systems., и . ICSOFT, стр. 332-344. SCITEPRESS, (2023)