Follow
Maximilian Walter
Title
Cited by
Cited by
Year
Modeling data flow constraints for design-time confidentiality analyses
S Hahner, S Seifermann, R Heinrich, M Walter, T Bureš, P Hnětynka
2021 IEEE 18th International Conference on Software Architecture Companion …, 2021
282021
Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
M Walter, R Heinrich, R Reussner
2022 IEEE 19th International Conference on Software Architecture (ICSA), 1-12, 2022
202022
Context-based confidentiality analysis for industrial iot
N Boltz, M Walter, R Heinrich
2020 46th Euromicro Conference on Software Engineering and Advanced …, 2020
192020
Dynamic security rules for legacy systems
R Al-Ali, P Hnetynka, J Havlik, V Krivka, R Heinrich, S Seifermann, ...
Proceedings of the 13th European Conference on Software Architecture-Volume …, 2019
172019
Modeling of dynamic trust contracts for industry 4.0 systems
R Al-Ali, R Heinrich, P Hnetynka, A Juan-Verdejo, S Seifermann, M Walter
Proceedings of the 12th European Conference on Software Architecture …, 2018
172018
Architectural Optimization for Confidentiality Under Structural Uncertainty
M Walter, S Hahner, S Seifermann, T Bures, P Hnetynka, J Pacovský, ...
Software Architecture: 15th European Conference, ECSA 2021 Tracks and …, 2022
142022
Capturing dynamicity and uncertainty in security and trust via situational patterns
T Bures, P Hnetynka, R Heinrich, S Seifermann, M Walter
Leveraging Applications of Formal Methods, Verification and Validation …, 2020
132020
Handling environmental uncertainty in design time access control analysis
N Boltz, S Hahner, M Walter, S Seifferman, R Heinrich, T Bureš, ...
2022 48th Euromicro Conference on Software Engineering and Advanced …, 2022
92022
Architecture-based attack path analysis for identifying potential security incidents
M Walter, R Heinrich, R Reussner
European Conference on Software Architecture, 37-53, 2023
72023
Model-based Confidentiality Analysis under Uncertainty
S Hahner, T Bitschi, M Walter, T Bureš, P Hnětynka, R Heinrich
2023 IEEE 20th International Conference on Software Architecture Companion …, 2023
72023
Automatic Derivation of Vulnerability Models for Software Architectures
YR Kirschner, M Walter, F Bossert, R Heinrich, A Koziolek
2023 IEEE 20th International Conference on Software Architecture Companion …, 2023
72023
Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0
M Walter, S Hahner, T Bureš, P Hnětynka, R Heinrich, R Reussner
at-Automatisierungstechnik 71 (6), 443-452, 2023
62023
Use cases in dataflow-based privacy and trust modeling and analysis in industry 4.0 systems
R Al-Ali, T Bures, BO Hartmann, J Havlik, R Heinrich, P Hnetynka, ...
KIT, 2018
62018
Generating adaptation rule-specific neural networks
T Bureš, P Hnětynka, M Kruliš, F Plášil, D Khalyeyev, S Hahner, ...
International Journal on Software Tools for Technology Transfer 25 (5), 733-746, 2023
42023
Dynamic access control in industry 4.0 systems
R Heinrich, S Seifermann, M Walter, S Hahner, R Reussner, T Bureš, ...
Digital Transformation: Core Technologies and Emerging Topics from a …, 2023
42023
Identifying confidentiality violations in architectural design using palladio
S Seifermann, M Walter, S Hahner, R Heinrich, R Reussner, R Heinrich
ECSA-C202021 2978, 2021
42021
Attuning adaptation rules via a rule-specific neural network
T Bureš, P Hnětynka, M Kruliš, F Plášil, D Khalyeyev, S Hahner, ...
Leveraging Applications of Formal Methods, Verification and Validation …, 2022
32022
Teaching Programming at Scale.
A Kaplan, J Keim, Y Schneider, M Walter, D Werle, A Koziolek, ...
SEUH, 2-6, 2020
32020
Evolving a Use Case for Industry 4.0 Environments Towards Integration of Physical Access Control.
S Seifermann, M Walter
Software Engineering (Workshops), 106-108, 2019
32019
Tool-Based Attack Graph Estimation and Scenario Analysis for Software Architectures
M Walter, R Reussner
European Conference on Software Architecture, 45-61, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20