Author of the publication

Detailed Analysis of Security Evaluation of Automotive Systems Based on JASO TP15002.

, , , and . SAFECOMP Workshops, volume 10489 of Lecture Notes in Computer Science, page 211-224. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assurance Carrying Code for Software Supply Chain., , , and . ISSRE Workshops, page 276-277. IEEE, (2021)Comparing Risk Identification in Hazard Analysis and Threat Analysis., and . SAFECOMP Workshops, volume 11094 of Lecture Notes in Computer Science, page 265-277. Springer, (2018)A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design., , , , and . Secur. Commun. Networks, (2019)Quantitative Analysis of Sparsely Synchronized Fail-Safe Processors., , and . QRS, page 1057-1068. IEEE, (2022)A Study of The Risk Quantification Method focusing on Direct-Access Attacks in Cyber-Physical Systems., , , and . DASC/PiCom/CBDCom/CyberSciTech, page 298-305. IEEE, (2021)Safe & Sec Case Patterns., , and . SAFECOMP Workshops, volume 9338 of Lecture Notes in Computer Science, page 27-37. Springer, (2015)Building a Body of Knowledge on Model Checking for Software Development., , , , , and . COMPSAC, page 784-789. IEEE Computer Society, (2013)On Validating Attack Trees with Attack Effects., , , and . SAFECOMP, volume 12234 of Lecture Notes in Computer Science, page 309-324. Springer, (2020)Formal Specification Based Automatic Test Generation for Embedded Network Systems., , , , , , , and . J. Appl. Math., (2014)Linking Traceability with GSN., , , and . ISSRE Workshops, page 192-197. IEEE Computer Society, (2014)