Author of the publication

Reactive Security for Smart Grids Using Models@run.time-Based Simulation and Reasoning.

, , , , and . SmartGridSec, volume 8448 of Lecture Notes in Computer Science, page 139-153. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Patrick Lerge University of Stuttgart

Replication Data for: "Development and plausibility assessment of an active human body model in numerical cyclist to vehicle collision simulations based on real-life accident data", , and . Dataset, (2024)Related to: N. Trube, P. Lerge, L.V. Noelle, J. Moennich, T. Lich, S. Schmitt, 'Development and plausibility assessment of an active human body model in numerical cyclist to vehicle collision simulations based on real-life accident data', IRCOBI Conference 2024.
 

Other publications of authors with the same name

Model-Based Testing of Obligations., , , and . QSIC, page 1-10. IEEE, (2014)Towards a 'Safe' Use of Design Patterns to Improve OO Software Testability., , , and . ISSRE, page 324-331. IEEE Computer Society, (2001)Building Trust into OO Components Using a Genetic Analogy., , , and . ISSRE, page 4-14. IEEE Computer Society, (2000)Testing Security Policies: Going Beyond Functional Testing., , and . ISSRE, page 93-102. IEEE Computer Society, (2007)Similarity testing for access control., , , , , , , , and . Information & Software Technology, (2015)Stress Testing of Transactional Database Systems., , , , and . JIDM, 4 (3): 279-294 (2013)Conviviality-driven access control policy., , , , , , and . Requir. Eng., 20 (4): 363-382 (2015)Composants objets fiables : une approche pragmatique., , , , and . L'OBJET, (1999)Coverage-Based Test Cases Selection for XACML Policies., , , , and . ICST Workshops, page 12-21. IEEE Computer Society, (2014)A Tridimensional Approach for Studying the Formal Verification of Model Transformations., , , , , , , and . ICST, page 921-928. IEEE Computer Society, (2012)