Andrea Tundis, Ph.D.
Title
Cited by
Cited by
Year
Towards security as a service (secaas): On the modeling of security services for cloud computing
A Furfaro, A Garro, A Tundis
2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014
352014
On the reliability analysis of systems and SoS: The RAMSAS method and related extensions
A Garro, A Tundis
IEEE Systems Journal 9 (1), 232-241, 2014
312014
A model-based method for system reliability analysis.
A Garro, A Tundis
SpringSim (TMS-DEVS), 2, 2012
302012
Formal requirements modeling for simulation-based verification
M Otter, N Thuy, D Bouskela, L Buffoni, H Elmqvist, P Fritzson, A Garro, ...
242015
Reliability analysis of an Attitude Determination and Control System (ADCS) through the RAMSAS method
A Garro, J Groß, A Tundis
Journal of Computational Science 5 (3), 439-449, 2014
222014
Modeling system requirements in modelica: definition and comparison of candidate approaches
A Tundis, L Rogovchenko-Buffoni, P Fritzson, A Garro
Proceedings of the 5th International Workshop on Equation-Based Object …, 2013
212013
On formal cyber physical system properties modeling: A new temporal logic language and a Modelica-based solution
A Garro, A Tundis, D Bouskela, A Jardin, N Thuy, M Otter, L Buffoni, ...
2016 IEEE International Symposium on Systems Engineering (ISSE), 1-8, 2016
192016
Enhancing the RAMSAS method for system reliability analysis-an exploitation in the automotive domain
A Garro, A Tundis
International Conference on Simulation and Modeling Methodologies …, 2012
182012
Modeling and simulation for system reliability analysis: The RAMSAS method
A Garro, A Tundis
2012 7th International Conference on System of Systems Engineering (SoSE …, 2012
172012
Requirement verification and dependency tracing during simulation in modelica
L Buffoni-Rogovchenko, P Fritzson, M Nyberg, A Garro, A Tundis
2013 8th EUROSIM Congress on Modelling and Simulation, 561-566, 2013
162013
An integrated toolchain for model based functional safety analysis
L Rogovchenko-Buffoni, A Tundis, MZ Hossain, M Nyberg, P Fritzson
Journal of Computational Science 5 (3), 408-414, 2014
152014
System reliability analysis: a Model-Based approach and a case study in the avionics industry
A Garro, A Tundis, N Chirillo
Proceedings of the 3rd Air and Space International Conference (CEAS), 1587-1595, 2011
142011
Requirements specification of a cloud service for Cyber Security compliance analysis
A Furfaro, T Gallo, A Garro, D Sacca, A Tundis
2016 2nd International Conference on Cloud Computing Technologies and …, 2016
132016
Modeling and simulation for the performance evaluation of the on-board communication system of a metro train
A Falcone, A Garro, A Tundis
13th International Conference on Modeling and Applied Simulation, MAS 2014 …, 2014
122014
A multi-language approach towards the identification of suspicious users on social networks
A Tundis, M Mühlhäuser
2017 International Carnahan Conference on Security Technology (ICCST), 1-6, 2017
112017
A review of network vulnerabilities scanning tools: types, capabilities and functioning
A Tundis, W Mazurczyk, M Mühlhäuser
Proceedings of the 13th International Conference on Availability …, 2018
102018
Dependability assessment of a deicing system through the RAMSAS method
A Tundis, D Ferretto, A Garro, E Brusa, M Mühlhäuser
2017 IEEE International Systems Engineering Symposium (ISSE), 1-8, 2017
92017
ResDevOps: a software engineering framework for achieving long-lasting complex systems
A Furfaro, T Gallo, A Garro, D Sacca, A Tundis
2016 IEEE 24th International Requirements Engineering Conference (RE), 246-255, 2016
92016
Modeling of system properties: Research challenges and promising solutions
A Garro, A Tundis
2015 IEEE International Symposium on Systems Engineering (ISSE), 324-331, 2015
92015
Supporting the identification and the assessment of suspicious users on twitter social media
A Tundis, G Bhatia, A Jain, M Mühlhäuser
2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018
82018
The system can't perform the operation now. Try again later.
Articles 1–20