Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Modeling and Verification of Security Property in Handel C Program., , , and . IJSSE, 3 (3): 50-65 (2012)A Framework to Support Generation and Maintenance of an Assurance Case., , and . ISSRE Workshops, page 21-24. IEEE Computer Society, (2016)Modeling Resiliency and Its Essential Components for Cyberphysical Systems., , , , and . FedCSIS Position Papers, volume 6 of Annals of Computer Science and Information Systems, page 107-114. (2015)A Novel and Unifying View of Trustworthiness in Cyberphysical Systems., and . MMM-ACNS, volume 10446 of Lecture Notes in Computer Science, page 327-338. Springer, (2017)Assessment of QoS adaptation capability of complex network systems., , and . DRCN, page 23-30. IEEE, (2016)Measure confidence of assurance cases in safety-critical domains., , , and . ICSE (NIER), page 13-16. ACM, (2018)Cyber-physical specification mismatch identification with dynamic analysis., , and . ICCPS, page 208-217. ACM, (2015)Reconfiguration of Autonomous Robotics., and . IJRAT, 3 (1): 41-58 (2015)Advanced Computer Technology for Novel Information Processing Paradigms., , , , and . JACIC, 1 (7): 308-317 (2004)Modeling and Verification of Humanoid Robot Task Coordination., and . HASE, page 73-80. IEEE Computer Society, (2014)