Author of the publication

R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems.

, , and . RV, volume 9333 of Lecture Notes in Computer Science, page 233-249. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Implementation of a PROLOG-like Theorem Prover based on the Connection Method., , , , and . AIMSA, page 29-36. (1986)Software health management: a necessity for safety critical systems., and . ISSE, 9 (4): 219-233 (2013)Amphion/NAV: Deductive Synthesis of State Estimation Software., , , , , , , , and . ASE, page 395-399. IEEE Computer Society, (2001)Verifikation von Authentifikationsprotokollen mit Automatischen Beweisern.. KI, 12 (4): 48-53 (1998)An ensemble approach to building Mercer Kernels with prior information., , and . SMC, page 2352-2359. IEEE, (2005)Automating the implementation of Kalman filter algorithms., and . ACM Trans. Math. Softw., 30 (4): 434-453 (2004)Presynaptic modulation as fast synaptic switching: state-dependent modulation of task performance, and . CoRR, (2004)PARTHEO: A Parallel Inference Machine., , and . Wissensbasierte Systeme, volume 227 of Informatik-Fachberichte, page 527-539. Springer, (1989)AutoBayes: a system for generating data analysis programs from statistical models., and . J. Funct. Program., 13 (3): 483-508 (2003)PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols.. CAV, volume 1633 of Lecture Notes in Computer Science, page 500-504. Springer, (1999)