672 results on '"Pretschner, Alexander"'
Search Results
202. Time-Series-Based Clustering for Failure Analysis in Hardware-in-the-Loop Setups: An Automotive Case Study
203. Defining a Software Maintainability Dataset: Collecting, Aggregating and Analysing Expert Evaluations of Software Maintainability
204. Knowledge aggregation with subjective logic in multi-agent self-adaptive cyber-physical systems
205. Umsetzung des datenschutzrechtlichen Auskunftsanspruchs auf Grundlage von Usage-Control und Data-Provenance-Technologien
206. Model-Based Testing in Practice
207. Part I. Testing of Finite State Machines
208. Part IV. Tools and Case Studies
209. Part VII. Appendices
210. Part V. Standardized Test Notation and Execution Architecture
211. Computing Refactorings of Behavior Models
212. Part III. Model-Based Test Case Generation
213. Part VI. Beyond Testing
214. 20 Model-Based Testing – A Glossary
215. Part II. Testing of Labeled Transition Systems
216. On Obligations
217. 10 Methodological Issues in Model-Based Testing
218. Abstractions for Model-Based Testing
219. Center for Code Excellence
220. Preface to the ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C)
221. Chapter Eight - A Taxonomy of Software Integrity Protection Techniques
222. Tool support for architectural decision making in large software intensive projects
223. Automatic Modeling and Simulating the Performance of Big Data Applications
224. Enhancing Data Flow Tracking for Data Usage Control
225. Scalable Greybox Fuzzing for Effective Vulnerability Management
226. Knowledge aggregation with subjective logic in multi-agent self-adaptive cyber-physical systems
227. Tool support for architectural decision making in large software intensive projects
228. Distributed usage control: Using a server-side architecture to connect specialized enforcement mechanisms with usage control requirements and policies
229. Engineering Secure and Dependable Software Systems
230. Compositional Generation of MC/DC Integration Test Suites
231. Characterizing the Strength of Software Obfuscation Against Automated Attacks
232. Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection.
233. Chapter Five - A Tutorial on Software Obfuscation
234. VirtSC
235. Extending Causal Models from Machines into Humans
236. Did We Test All Scenarios for Automated and Autonomous Driving Systems?
237. Selecting Flow Optimal System Parameters for Automated Driving Systems
238. Failure clustering without coverage
239. Science of design for societal-scale cyber-physical systems: challenges and opportunities
240. Learning Approach for Smart Self-Adaptive Cyber-Physical Systems
241. Learning a Classifier for Prediction of Maintainability Based on Static Analysis Tools
242. Attack graph generation for microservice architecture
243. A real-time remote IDS testbed for connected vehicles
244. Data Usage Control for Distributed Systems
245. Defect-based Quality Assurance with Defect Models
246. Semi-Automatic Security Testing of Web Applications with Fault Models and Properties
247. Behavior-based Malware Detection with Quantitative Data Flow Analysis
248. A Comprehensive Attack and Defense Model for the Automotive Domain
249. Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection
250. Practical Integrity Protection with Oblivious Hashing
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.