Personensuche
X
?
Communications in Computer and Information Science; Digital Sovereignty in Cyber Security: New Challenges in Future Vision ,
1
Using Statistical Model Checking for Cybersecurity Analysis:
, In:
?
IFIP Advances in Information and Communication Technology; Information Security Education - Adapting to the Fourth Industrial Revolution ,
5
A Maturity Assessment Model for Cyber Security Education in..:
, In:
?
Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification; Lecture Notes in Computer Science ,
6
Learning to Learn HVAC Failures: Layering ML Experiments in..:
, In:
?
2021 IEEE 34th Computer Security Foundations Symposium (CSF) ,
9
Efficient Algorithms for Quantitative Attack Tree Analysis:
, In:
?
Quantitative Evaluation of Systems; Lecture Notes in Computer Science ,
10
Attack Trees vs. Fault Trees: Two Sides of the Same Coin fr..:
, In:
?
Model Checking Software; Lecture Notes in Computer Science ,
11
The Marriage Between Safety and Cybersecurity: Still Practi..:
, In:
?
Tools and Algorithms for the Construction and Analysis of Systems; Lecture Notes in Computer Science ,
12
Replicating $$\textsc {Restart}$$ with Prolonged Retrials: ..:
, In:
?
Leveraging Applications of Formal Methods, Verification and Validation: Tools and Trends; Lecture Notes in Computer Science ,
13
On Correctness, Precision, and Performance in Quantitative ..:
, In:
?
Quantitative Evaluation of Systems; Lecture Notes in Computer Science ,
14
Correction to: The Dynamic Fault Tree Rare Event Simulator:
, In:
?
Tools and Algorithms for the Construction and Analysis of Systems; Lecture Notes in Computer Science ,
15