Folgen
Roland Rieke
Roland Rieke
Bestätigte E-Mail-Adresse bei sit.fraunhofer.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Security requirements for automotive on-board networks based on dark-side scenarios
A Ruddle, B Weyl, S Idrees, Y Roudier, M Friedewald, T Leimbach, ...
European Commission, 2009
137*2009
The SH-Verification Tool—Abstraction-Based Verification of Co-operating Systems
P Ochsenschläger, J Repp, R Rieke, U Nitsche
Formal Aspects of Computing 10, 381-404, 1998
681998
Fraud detection in mobile payments utilizing process behavior analysis
R Rieke, M Zhdanova, J Repp, R Giot, C Gaber
2013 International Conference on Availability, Reliability and Security, 662-669, 2013
642013
Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection
I Berger, R Rieke, M Kolomeets, A Chechulin, I Kotenko
Computer Security. ESORICS 2018 International Workshops, CyberICPS 2018 and …, 2019
552019
Behavior analysis for safety and security in automotive systems
R Rieke, M Seidemann, EK Talla, D Zelle, B Seeger
2017 25th Euromicro International Conference on Parallel, Distributed and …, 2017
402017
No smurfs: Revealing fraud chains in mobile money transfers
M Zhdanova, J Repp, R Rieke, C Gaber, B Hemery
2014 Ninth International Conference on Availability, Reliability and …, 2014
392014
Attack surface assessment for cybersecurity engineering in the automotive domain
C Plappert, D Zelle, H Gadacz, R Rieke, D Scheuermann, C Krauß
2021 29th Euromicro international conference on parallel, distributed and …, 2021
352021
A trusted information agent for security information and event management
L Coppolino, M Jäger, N Kuntze, R Rieke
ICONS 2012, The Seventh International Conference on Systems, 6-12, 2012
332012
Identification of security requirements in systems of systems by functional security analysis
A Fuchs, R Rieke
Architecting Dependable Systems VII, 74-96, 2010
312010
ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering
D Zelle, C Plappert, R Rieke, D Scheuermann, C Krauß
Microprocessors and Microsystems 90, 104461, 2022
292022
Modelling and analysing network security policies in a given vulnerability setting
R Rieke
Critical Information Infrastructures Security: First International Workshop …, 2006
272006
Abstraction and composition: a verification method for co-operating systems
P Ochsenschläger, J Repp, R Rieke
Journal of Experimental & Theoretical Artificial Intelligence 12 (4), 447-459, 2000
272000
Security and reliability requirements for advanced security event management
R Rieke, L Coppolino, A Hutchison, E Prieto, C Gaber
Computer Network Security: 6th International Conference on Mathematical …, 2012
252012
MASSIF: A promising solution to enhance olympic games IT security
E Prieto, R Diaz, L Romano, R Rieke, M Achemlal
International Conference on e-Democracy, 139-147, 2011
222011
Predictive security analysis for event-driven processes
R Rieke, Z Stoynova
Computer Network Security: 5th International Conference on Mathematical …, 2010
222010
Tool based formal modelling, analysis and visualisation of enterprise network vulnerabilities utilising attack graph exploration
R Rieke
Proceedings EICAR, 2004
212004
Sepad–security evaluation platform for autonomous driving
D Zelle, R Rieke, C Plappert, C Krauß, D Levshun, A Chechulin
2020 28th Euromicro International Conference on Parallel, Distributed and …, 2020
192020
Model-based security event management
J Schütte, R Rieke, T Winkelvos
Computer Network Security: 6th International Conference on Mathematical …, 2012
192012
Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models
F Fenzl, R Rieke, Y Chevalier, A Dominik, I Kotenko
Simulation Modelling Practice and Theory 105, 102143, 2020
182020
Monitoring security compliance of critical processes
R Rieke, J Repp, M Zhdanova, J Eichler
2014 22nd Euromicro International Conference on Parallel, Distributed, and …, 2014
182014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20