Filter your results
- 3
- 3
- 3
- 1
- 3
- 1
- 1
- 1
- 3
- 1
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Automated Identification of Performance Bottleneck on Embedded Systems for Design Space Exploration4th International Embedded Systems Symposium (IESS), Jun 2013, Paderborn, Germany. pp.171-180, ⟨10.1007/978-3-642-38853-8_16⟩
Conference papers
hal-01466671v1
|
||
|
A Proposal on Security Case Based on Common Criteria1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.331-336, ⟨10.1007/978-3-642-36818-9_36⟩
Conference papers
hal-01480190v1
|
||
|
A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.457-464
Conference papers
hal-01506567v1
|