Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 46 matches
- 2016
- Jaime C. Acosta, Salamah Salamah:
An Analysis Platform for Execution-Based Model Generation. HASE 2016: 246-247 - Sridhar Adepu, Aditya Mathur:
An Investigation into the Response of a Water Treatment System to Cyber Attacks. HASE 2016: 141-148 - Mohammed Al-Refai, Walter Cazzola, Sudipto Ghosh, Robert B. France:
Using Models to Validate Unanticipated, Fine-Grained Adaptations at Runtime. HASE 2016: 23-30 - Anneliese Andrews, Mahmoud Abdelgawad, Ahmed Gario:
World Model for Testing Autonomous Systems Using Petri Nets. HASE 2016: 65-69 - Tarek Awwad, Nadia Bennani, Lionel Brunie, David Coquil, Harald Kosch, Veronika Rehn-Sonigo:
Task Characterization for an Effective Worker Targeting in Crowdsourcing. HASE 2016: 63-64 - Guillaume Babin, Yamine Aït Ameur, Marc Pantel:
Correct Instantiation of a System Reconfiguration Pattern: A Proof and Refinement-Based Approach. HASE 2016: 31-38 - Marcello M. Bersani, Marisol García-Valls:
The Cost of Formal Verification in Adaptive CPS. An Example of a Virtualized Server Node. HASE 2016: 39-46 - Raymond C. Borges-Hink, Katerina Goseva-Popstojanova:
Characterization of Cyberattacks Aimed at Integrated Industrial Control and Enterprise Systems: A Case Study. HASE 2016: 149-156 - Swastik Brahma, Kevin A. Kwiat, Pramod K. Varshney, Charles A. Kamhoua:
CSRS: Cyber Survive and Recover Simulator. HASE 2016: 110-113 - Qi Cheng, Kevin A. Kwiat, Charles A. Kamhoua:
Design Diversity for Mitigating Monoculture Induced Threats. HASE 2016: 17-18 - Silvano Chiaradonna, Felicita Di Giandomenico, Jun Xiao:
Quantification of the Effectiveness of Medium Voltage Control Policies in Smart Grids. HASE 2016: 284-291 - Key-whan Chung, Charles A. Kamhoua, Kevin A. Kwiat, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Game Theory with Learning for Cyber Security Monitoring. HASE 2016: 1-8 - Sara Cleemput, Mustafa A. Mustafa, Bart Preneel:
High Assurance Smart Metering. HASE 2016: 294-297 - Saikat Das, Mohammad Zulkernine:
CLOUBEX: A Cloud-Based Security Analysis Framework for Browser Extensions. HASE 2016: 268-275 - Lian Duan, Sanjai Rayadurgam, Mats Per Erik Heimdahl, Oleg Sokolsky, Insup Lee:
Representation of Confidence in Assurance Cases Using the Beta Distribution. HASE 2016: 86-93 - Ralph Eastwood, Robert Alexander, Tim Kelly:
Safe Multi-objective Planning with a Posteriori Preferences. HASE 2016: 78-85 - Yuan Fei, Huibiao Zhu, Xi Wu, Huixing Fang:
Comparative Modeling and Verification of Pthreads and Dthreads. HASE 2016: 132-140 - Eduardo B. Fernández:
Preventing and unifying threats in cyberphysical systems. HASE 2016: 292-293 - Kerianne H. Gross, Aaron W. Fifarek, Jonathan A. Hoffman:
Incremental Formal Methods Based Design Approach Demonstrated on a Coupled Tanks Control System. HASE 2016: 181-188 - Ashlie B. Hocking, M. Anthony Aiello, John C. Knight, Nikos Aréchiga:
Proving Critical Properties of Simulink Models. HASE 2016: 189-196 - Paul Hyden, Ira S. Moskowitz, Stephen Russell:
Using Network Topology to Supplement High Assurance Systems. HASE 2016: 213-219 - Alexei Iliasov, Alexander B. Romanovsky:
Formal Analysis of Railway Signalling Data. HASE 2016: 70-77 - Alexei Iliasov, Alexander B. Romanovsky, Elena Troubitsyna, Linas Laibinis:
Formalisation-Driven Development of Safety-Critical Systems. HASE 2016: 165-172 - Md. Shahrear Iqbal, Mohammad Zulkernine, Fehmi Jaafar, Yuan Gu:
FCFraud: Fighting Click-Fraud from the User Side. HASE 2016: 157-164 - Azadeh Jahanbanifar, Ferhat Khendek, Maria Toeroe:
Runtime Adjustment of Configuration Models for Consistency Preservation. HASE 2016: 102-109 - Yufei Jiang, Can Zhang, Dinghao Wu, Peng Liu:
Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods. HASE 2016: 122-131 - Pankaj Kamthan, Nazlie Shahmir:
Modeling Negative User Stories is Risky Business. HASE 2016: 236-237 - Sunint Kaur Khalsa, Yvan Labiche:
An Extension of Category Partition Testing for Highly Constrained Systems. HASE 2016: 47-54 - Michaël Lauer, Matthieu Amy, Jean-Charles Fabre, Matthieu Roy, William Excoffon, Miruna Stoicescu:
Engineering Adaptive Fault-Tolerance Mechanisms for Resilient Computing on ROS. HASE 2016: 94-101 - Hong Liu, Tianyu Yang, Jing Wang:
Model Checking for the Fault Tolerance of Collaborative AUVs. HASE 2016: 244-245
skipping 16 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-13 16:07 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint