Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal verification of functional properties of a SCR-style software requirements specification using PVS., , and . Rel. Eng. & Sys. Safety, 87 (3): 351-363 (2005)An effective technique for the software requirements analysis of NPP safety-critical systems, based on software inspection, requirements traceability, and formal specification., , , , and . Rel. Eng. & Sys. Safety, 89 (3): 248-260 (2005)A quantitative approach to estimate a website security risk using whitelist., , , and . Security and Communication Networks, 5 (10): 1181-1192 (2012)An empirical evaluation of six methods to detect faults in software., , , and . Softw. Test., Verif. Reliab., 12 (3): 155-171 (2002)FBDVerifier: Interactive and Visual Analysis of Counterexample in Formal Verification of Function Block Diagram., , , , , , and . Journal of Research and Practice in Information Technology, 42 (3): 171-188 (2010)SAD: web session anomaly detection based on parameter estimation., and . Computers & Security, 23 (4): 312-319 (2004)Generating test sequences using symbolic execution for event-driven real-time systems., and . Microprocessors and Microsystems, 27 (10): 523-531 (2003)VIS Analyzer: A Visual Assistant for VIS Verification and Analysis., , and . ISORC, page 250-254. IEEE Computer Society, (2010)Task.o object modeling approach for robot workcell programming., , and . COMPSAC, page 109-114. IEEE Computer Society, (1997)Testing of Timer Function Blocks in FBD., , , , , , and . APSEC, page 243-250. IEEE Computer Society, (2006)