Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A robust approach for on-line and off-line threat detection based on event tree similarity analysis., , , and . AVSS, page 414-419. IEEE Computer Society, (2011)Empty Vehicle Detection with Video Analytics., , , , , and . ICIAP (2), volume 8157 of Lecture Notes in Computer Science, page 731-739. Springer, (2013)Model-Based Early Warning and Decision Support to Improve Infrastructure Surveillance., , and . ERCIM News, (2009)Automatic instantiation of abstract tests on specific configurations for large critical control systems., , and . Softw. Test., Verif. Reliab., 19 (2): 91-110 (2009)On the use of models for the dependability and security of transit systems and infrastructures: a multi-year industrial experience report.. IJCCBS, 3 (3): 229-244 (2012)Complex, Resilient and Smart Systems., , , and . Resilience of Cyber-Physical Systems, Springer, (2019)On synergies of cyber and physical security modelling in vulnerability assessment of railway systems., , , , and . Computers & Electrical Engineering, (2015)Freight Train monitoring: A Case-Study for the pSHIELD Project., , , and . IMIS, page 597-602. IEEE Computer Society, (2012)Wireless Sensor Data Fusion for Critical Infrastructure Security., , , , and . CISIS, volume 53 of Advances in Soft Computing, page 92-99. Springer, (2008)A Grey-Box Approach to the Functional Testing of Complex Automatic Train Protection Systems., , , , , and . EDCC, volume 3463 of Lecture Notes in Computer Science, page 305-317. Springer, (2005)