Petkovich, J.-C. ., Oliveira, A. ., Zhang, Y. ., Reidemeister, T. ., & Fischmeister, S. . (2016). DataMill: a distributed heterogeneous infrastructure for robust experimentation. Software Practice and Experience, 46, 29. https://doi.org/10.1002/spe.2382
Reference author: Sebastian Fischmeister
First name
Sebastian
Last name
Fischmeister
Moreno, C. ., & Fischmeister, S. . (2017). Non-Intrusive Runtime Monitoring Through Power Consumption to Enforce Safety and Security Properties in Embedded Systems. Formal Methods in Software Design (FMSD).
Kauffman, S. ., Havelund, K. ., Joshi, R. ., & Fischmeister, S. . (2018). Inferring Event Stream Abstractions. Formal Methods in System Design, 29. https://doi.org/10.1007/s10703-018-0317-z
Narayan, A. ., Cutulenco, G. ., Joshi, Y. ., & Fischmeister, S. . (2018). Mining Timed Regular Specifications from System Traces. ACM Transactions on Embedded Computing Systems, 17. https://doi.org/10.1145/3147660
Moreno, C. ., & Fischmeister, S. . (2017). Accurate Measurement of Small Execution Times - Getting Around Measurement Errors. N/A.
Moreno, C. ., & Fischmeister, S. . (2017). Accurate Measurement of Small Execution Times — Getting Around Measurement Errors. Embedded Systems Letters (ESL).
Sharma, S. ., Flores, A. ., Hobbs, C. ., Stafford, J. ., & Fischmeister, S. . (2019). Safety and Security Analysis of AEB for L4 Autonomous Vehicle Using STPA. Workshop on Autonomous Systems Design (ASD 2019). Presented at the. Florence, Italy.
Shrestha, S. L., Lee, T. ., & Fischmeister, S. . (2022). Metasploit for Cyber-Physical Security Testing with Real-Time Constraints. 5th International Conference on Science of Cyber Security (SciSec). Presented at the. Matsue, Japan.
Carvajal, G. ., Salem, M. ., Benann, N. ., & Fischmeister, S. . (2017). Enabling Rapid Construction of Arrival Curves From Execution Traces. IEEE Design & Test, PP. https://doi.org/10.1109/MDAT.2017.2771210
Basiri, M. H., Azad, N. L., & Fischmeister, S. . (2021). Secure Dynamic Nonlinear Heterogeneous Vehicle Platooning: Denial-of-Service Cyber-Attack Case. In Security and Privacy in Cyber-Physical Systems: Threats and Defenses. Studies in Systems, Decision and Control. Springer.
- Previous page
- Currently on page 12 12
- Next page