Author of the publication

What Today's Serious Cyber Attacks on Cars Tell Us: Consequences for Automotive Security and Dependability.

, and . IMBSA, volume 11842 of Lecture Notes in Computer Science, page 270-285. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Manifoldness of Variability Modeling - Considering the Potential for Further Integration., , and . CEE-SET, volume 5082 of Lecture Notes in Computer Science, page 291-303. Springer, (2007)Hardware-unabhängige Spezifikation von Steuergeräte-Software., and . Softwaretechnik-Trends, (2004)EAST-ADL: An Architecture Description Language for Automotive Software-intensive Systems in the Light of Recent use and Research., , , , , , , and . IJSDA, 5 (3): 1-20 (2016)Intra-Task Parallelism in Automotive Real-Time Systems., , , , , and . PMAM@PPoPP, page 61-70. ACM, (2018)Compositional Variability - Concepts and Patterns., , and . HICSS, page 1-10. IEEE Computer Society, (2009)The EAST-ADL Architecture Description Language for Automotive Embedded Software., , , , , , , , , and 1 other author(s). Model-Based Engineering of Embedded Real-Time Systems, volume 6100 of Lecture Notes in Computer Science, page 297-307. Springer, (2007)Attacks on Machine Learning: Lurking Danger for Accountability., , and . SafeAI@AAAI, volume 2301 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Reusing Requirements: The Need for Extended Variability Models., and . FSEN, volume 4767 of Lecture Notes in Computer Science, page 129-143. Springer, (2007)Managing Complexity of Automotive Electronics Using the EAST-ADL., , , , , , , , , and . ICECCS, page 353-358. IEEE Computer Society, (2007)Optimal Product Line Architectures for the Automotive Industry., , and . Modellierung, volume P-280 of LNI, page 119-134. Gesellschaft für Informatik e.V., (2018)