-
1
-
2
-
3
-
4
-
5
Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
Published 2012“…LNCS…”
Conference item -
6
-
7
-
8
Safe and Economic re−use of ontologies: a logic−based methodology and tool support
Published 2008“…Springer LNCS…”
Conference item -
9
-
10
Relating Data Independent Trace Checks in CSP with UNITY Reachability under a Normality Assumption
Published 2004“…Springer LNCS…”
Conference item -
11
Complete Query Answering over Horn Ontologies Using a Triple Store.
Published 2013“…Springer LNCS…”
Conference item -
12
On Model checking data−independent systems with arrays with whole−array operations
Published 2005“…Springer LNCS…”
Conference item -
13
Self−Protection in P2P Networks: Choosing the Right Neighbourhood
Published 2006“…Springer LNCS…”
Conference item -
14
On Self−coordination in Wireless Community Networks
Published 2006“…Springer LNCS…”
Conference item -
15
-
16
-
17
Applying Game Semantics to Compositional Software Modelling and verification
Published 2004“…Springer LNCS…”
Conference item -
18
-
19
Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources
Published 2012“…Springer Berlin/Heidelberg LNCS…”
Conference item -
20
A Modelling Approach for Interdependency in Digital Systems−of−Systems Security − Extended Abstract
Published 2010“…Athens‚ Greece‚ LNCS 6712‚ Springer Verlag…”
Conference item