Author of the publication

Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure.

, , , , and . CRITIS, volume 6027 of Lecture Notes in Computer Science, page 201-212. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A conservative bound for the probability of failure of a 1-out-of-2 protection system with one hardware-only and one software-based protection train., , , , , and . Rel. Eng. & Sys. Safety, (2014)Fault Diversity among Off-The-Shelf SQL Database Servers., , and . DSN, page 389-398. IEEE Computer Society, (2004)Estimating Bounds on the Reliability of Diverse Systems., , , and . IEEE Trans. Software Eng., 29 (4): 345-359 (2003)Modeling software design diversity., , and . ACM Comput. Surv., 33 (2): 177-208 (2001)Stochastic Modeling of Safety and Security of the e-Motor, an ASIL-D Device.. SAFECOMP, volume 9337 of Lecture Notes in Computer Science, page 385-399. Springer, (2015)Reliability Assessment of Legacy Safety-Critical Systems Upgraded with Off-the-Shelf Components.. SAFECOMP, volume 2434 of Lecture Notes in Computer Science, page 139-150. Springer, (2002)Choosing Effective Methods for Design Diversity - How to Progress from Intuition to Science., , and . SAFECOMP, volume 1698 of Lecture Notes in Computer Science, page 272-285. Springer, (1999)Modelling the Effects of Combining Diverse Software Fault Detection Techniques., , , and . Formal Methods and Testing, volume 4949 of Lecture Notes in Computer Science, page 345-366. Springer, (2008)The effect of testing on the reliability of single version and 1-out-of-2 software systems., and . ISSRE, page 219-228. IEEE Computer Society, (1995)Model-Based Evaluation of the Resilience of Critical Infrastructures Under Cyber Attacks., , and . CRITIS, volume 8985 of Lecture Notes in Computer Science, page 231-243. Springer, (2014)