Author:
Gashi Ilir,Povyakalo Andrey,Strigini Lorenzo
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Which Attacks Lead to Hazards? Combining Safety and Security Analysis for Cyber-Physical Systems;IEEE Transactions on Dependable and Secure Computing;2023
2. Redundancy-based intrusion tolerance approaches moving from classical fault tolerance methods;International Journal of Applied Mathematics and Computer Science;2022
3. Basic Aspects in Redundancy-Based Intrusion Tolerance;14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021);2021-09-22
4. Characterizing Sets of Systems: Representation and Analysis of Across-Systems Properties;Beyond Interactions;2020
5. Programming the CLEARSY Safety Platform with B;Rigorous State-Based Methods;2020