479.575 PEOPLE
People | Locations | Statistics |
---|---|---|
Ziakopoulos, Apostolos | Athens |
|
Vigliani, Alessandro | Turin |
|
Catani, Jacopo | Rome |
|
Statheros, Thomas | Stevenage |
|
Utriainen, Roni | Tampere |
|
Guglieri, Giorgio | Turin |
|
Martínez Sánchez, Joaquín |
| |
Tobolar, Jakub |
| |
Volodarets, M. |
| |
Piwowar, Piotr |
| |
Tennoy, Aud | Oslo |
|
Matos, Ana Rita |
| |
Cicevic, Svetlana |
| |
Sommer, Carsten | Kassel |
|
Liu, Meiqi |
| |
Pirdavani, Ali | Hasselt |
|
Niklaß, Malte |
| |
Lima, Pedro | Braga |
|
Turunen, Anu W. |
| |
Antunes, Carlos Henggeler |
| |
Krasnov, Oleg A. |
| |
Lopes, Joao P. |
| |
Turan, Osman |
| |
Lučanin, Vojkan | Belgrade |
|
Tanaskovic, Jovan |
|
Cheah, Madeline
in Cooperation with on an Cooperation-Score of 37%
Topics
Publications (12/12 displayed)
- 2021Scenario Optimisation and Sensitivity Analysis for Safe Automated Driving Using Gaussian Processescitations
- 2019Context-aware anomaly detector for monitoring cyber attacks on automotive CAN buscitations
- 2019A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Examplecitations
- 2019Enabling security checking of automotive ECUs with formal CSP modelscitations
- 2018Building an automotive security assurance case using systematic security evaluationscitations
- 2018Formalising Systematic Security Evaluations using Attack Trees for Automotive Applicationscitations
- 2017Towards A Testbed for Automotive Cybersecuritycitations
- 2017Towards a systematic security evaluation of the automotive Bluetooth interfacecitations
- 2017Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Studycitations
- 2017Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applicationscitations
- 2017Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applicationscitations
- 2016Combining Third Party Components Securely in Automotive Systemscitations
Places of action