Wasicek, Armin
20  results:
Search for persons X
?
1

Summary of DNS Over HTTPS Abuse:

Hynek, Karel ; Vekshin, Dmitrii ; Luxemburk, Jan..
IEEE Access.  10 (2022)  - p. 54668-54680 , 2022
 
?
2

Large Scale Analysis of DoH Deployment on the Internet:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
 
?
3

An Integrated Simulation Tool for Computer Architecture and..:

, In: Cyber Physical Systems. Design, Modeling, and Evaluation; Lecture Notes in Computer Science,
Kim, Hokeun ; Wasicek, Armin ; Lee, Edward A. - p. 83-93 , 2019
 
?
4

Actors Revisited for Time-Critical Systems:

, In: Proceedings of the 56th Annual Design Automation Conference 2019,
 
?
5

A Vision of Swarmlets:

Latronico, Elizabeth ; Lee, Edward A. ; Lohstroh, Marten...
IEEE Internet Computing.  19 (2015)  2 - p. 20-28 , 2015
 
?
6

System simulation from operational data:

, In: Proceedings of the 52nd Annual Design Automation Conference,
Wasicek, Armin ; Lee, Edward A. ; Kim, Hokeun... - p. 1-6 , 2015
 
?
7

Aspect-oriented Modeling of Attacks in Automotive Cyber-Phy..:

, In: Proceedings of the 51st Annual Design Automation Conference,
 
?
8

Session details: CAD for next-generation vehicles:

, In: Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design,
 
?
11

Spatio-temporal patterns : using spatio-temporal predicates..:

Wasicek, Armin
https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-27666.  , 2020
 
?
12

Invited: Actors revisited for time-critical systems:

Lohstroh, Marten ; Schoeberl, Martin ; Goens, Andrés...
https://orbit.dtu.dk/en/publications/328eb2cb-de44-4662-96dc-6ca3e49f101f.  , 2019
 
1-15