BibTeX records: Zhendong Ma

download as .bib file

@article{DBLP:journals/corr/abs-2201-02601,
  author       = {Zhendong Ma},
  title        = {Apples and Cars: a Comparison of Security},
  journal      = {CoRR},
  volume       = {abs/2201.02601},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.02601},
  eprinttype    = {arXiv},
  eprint       = {2201.02601},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-02601.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/MartinMSWKSAMK20,
  author       = {Helmut Martin and
                  Zhendong Ma and
                  Christoph Schmittner and
                  Bernhard Winkler and
                  Martin Krammer and
                  Daniel Schneider and
                  Tiago Amorim and
                  Georg Macher and
                  Christian Kreiner},
  title        = {Combined automotive safety and security pattern engineering approach},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {198},
  pages        = {106773},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ress.2019.106773},
  doi          = {10.1016/J.RESS.2019.106773},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ress/MartinMSWKSAMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijspm/FanZYFMG19,
  author       = {Rang{-}Lin Fan and
                  Chu{-}Yuan Zhang and
                  Fang Yin and
                  Cheng{-}Cheng Feng and
                  Zhendong Ma and
                  Hua{-}Bing Gong},
  title        = {Finite element analysis for engine crankshaft torsional stiffness},
  journal      = {Int. J. Simul. Process. Model.},
  volume       = {14},
  number       = {4},
  pages        = {389--396},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSPM.2019.103590},
  doi          = {10.1504/IJSPM.2019.103590},
  timestamp    = {Thu, 07 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijspm/FanZYFMG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cecc/MarksteinerM19,
  author       = {Stefan Marksteiner and
                  Zhendong Ma},
  title        = {Approaching the Automation of Cyber Security Testing of Connected
                  Vehicles},
  booktitle    = {Proceedings of the Third Central European Cybersecurity Conference,
                  {CECC} 2019, Munich, Germany, November 14-15, 2019},
  pages        = {22:1--22:3},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3360664.3360729},
  doi          = {10.1145/3360664.3360729},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cecc/MarksteinerM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vehits/VasenevSHMSKL19,
  author       = {Alexandr Vasenev and
                  Florian Stahl and
                  Hayk Hamazaryan and
                  Zhendong Ma and
                  Lijun Shan and
                  Joerg Kemmerich and
                  Claire Loiseaux},
  editor       = {Oleg Gusikhin and
                  Markus Helfert},
  title        = {Practical Security and Privacy Threat Analysis in the Automotive Domain:
                  Long Term Support Scenario for Over-the-Air Updates},
  booktitle    = {Proceedings of the 5th International Conference on Vehicle Technology
                  and Intelligent Transport Systems, {VEHITS} 2019, Heraklion, Crete,
                  Greece, May 3-5, 2019},
  pages        = {550--555},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007764205500555},
  doi          = {10.5220/0007764205500555},
  timestamp    = {Thu, 06 Jun 2019 13:06:22 +0200},
  biburl       = {https://dblp.org/rec/conf/vehits/VasenevSHMSKL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-06589,
  author       = {Stefan Marksteiner and
                  Zhendong Ma},
  title        = {Approaching the Automation of Cyber Security Testing of Connected
                  Vehicles},
  journal      = {CoRR},
  volume       = {abs/1911.06589},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.06589},
  eprinttype    = {arXiv},
  eprint       = {1911.06589},
  timestamp    = {Mon, 02 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-06589.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurospi/SchmittnerGM18,
  author       = {Christoph Schmittner and
                  Gerhard Griessnig and
                  Zhendong Ma},
  editor       = {Xabier Larrucea and
                  Izaskun Santamar{\'{\i}}a and
                  Rory V. O'Connor and
                  Richard Messnarz},
  title        = {Status of the Development of {ISO/SAE} 21434},
  booktitle    = {Systems, Software and Services Process Improvement - 25th European
                  Conference, EuroSPI 2018, Bilbao, Spain, September 5-7, 2018, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {896},
  pages        = {504--513},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97925-0\_43},
  doi          = {10.1007/978-3-319-97925-0\_43},
  timestamp    = {Tue, 25 Jan 2022 13:33:43 +0100},
  biburl       = {https://dblp.org/rec/conf/eurospi/SchmittnerGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/SchmittnerHM18,
  author       = {Christoph Schmittner and
                  Christian Hirsch and
                  Zhendong Ma},
  title        = {Smart Farming: From Automated Machinery to the Cloud},
  journal      = {{ERCIM} News},
  volume       = {2018},
  number       = {113},
  year         = {2018},
  url          = {https://ercim-news.ercim.eu/en113/special/smart-farming-from-automated-machinery-to-the-cloud},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/SchmittnerHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/MetayerBCGJJKMM17,
  author       = {Daniel Le M{\'{e}}tayer and
                  Mathias Bossuet and
                  Fanny Coudert and
                  Claire Gayrel and
                  Francisco J. Jaime and
                  Christophe Jouvray and
                  Antonio Kung and
                  Zhendong Ma and
                  Antonio Ma{\~{n}}a},
  title        = {Interdisciplinarity in practice: Challenges and benefits for privacy
                  research},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {33},
  number       = {6},
  pages        = {864--869},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.clsr.2017.05.020},
  doi          = {10.1016/J.CLSR.2017.05.020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/MetayerBCGJJKMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PappBM17,
  author       = {Dorottya Papp and
                  Levente Butty{\'{a}}n and
                  Zhendong Ma},
  title        = {Towards Semi-automated Detection of Trigger-based Behavior for Software
                  Security Assurance},
  booktitle    = {Proceedings of the 12th International Conference on Availability,
                  Reliability and Security, Reggio Calabria, Italy, August 29 - September
                  01, 2017},
  pages        = {64:1--64:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098954.3105821},
  doi          = {10.1145/3098954.3105821},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PappBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MaierMB17,
  author       = {Patrik Maier and
                  Zhendong Ma and
                  Roderick Bloem},
  title        = {Towards a Secure {SCRUM} Process for Agile Web Application Development},
  booktitle    = {Proceedings of the 12th International Conference on Availability,
                  Reliability and Security, Reggio Calabria, Italy, August 29 - September
                  01, 2017},
  pages        = {73:1--73:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098954.3103171},
  doi          = {10.1145/3098954.3103171},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MaierMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etfa/SchmittnerMRA17,
  author       = {Christoph Schmittner and
                  Zhendong Ma and
                  Thomas Ruprechter and
                  Andreas Aldrian},
  title        = {Practical safe, secure and reliable machine-to-machine connectivity
                  for cyber-physical-production systems},
  booktitle    = {22nd {IEEE} International Conference on Emerging Technologies and
                  Factory Automation, {ETFA} 2017, Limassol, Cyprus, September 12-15,
                  2017},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ETFA.2017.8247726},
  doi          = {10.1109/ETFA.2017.8247726},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/etfa/SchmittnerMRA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/MaHSP17,
  author       = {Zhendong Ma and
                  Aleksandar Hudic and
                  Abdelkader Magdy Shaaban and
                  S{\'{a}}ndor Pl{\'{o}}sz},
  title        = {Security Viewpoint in a Reference Architecture Model for Cyber-Physical
                  Production Systems},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy Workshops,
                  EuroS{\&}P Workshops 2017, Paris, France, April 26-28, 2017},
  pages        = {153--159},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSPW.2017.65},
  doi          = {10.1109/EUROSPW.2017.65},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/MaHSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/WinterRGFM17,
  author       = {Karolin Winter and
                  Stefanie Rinderle{-}Ma and
                  Wilfried Grossmann and
                  Ingo Feinerer and
                  Zhendong Ma},
  editor       = {Herv{\'{e}} Panetto and
                  Christophe Debruyne and
                  Walid Gaaloul and
                  Mike P. Papazoglou and
                  Adrian Paschke and
                  Claudio Agostino Ardagna and
                  Robert Meersman},
  title        = {Characterizing Regulatory Documents and Guidelines Based on Text Mining},
  booktitle    = {On the Move to Meaningful Internet Systems. {OTM} 2017 Conferences
                  - Confederated International Conferences: CoopIS, C{\&}TC, and
                  {ODBASE} 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10573},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69462-7\_1},
  doi          = {10.1007/978-3-319-69462-7\_1},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/WinterRGFM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/MartinBSMGRM17,
  author       = {Helmut Martin and
                  Robert Bramberger and
                  Christoph Schmittner and
                  Zhendong Ma and
                  Thomas Gruber and
                  Alejandra Ruiz and
                  Georg Macher},
  editor       = {Stefano Tonetta and
                  Erwin Schoitsch and
                  Friedemann Bitsch},
  title        = {Safety and Security Co-engineering and Argumentation Framework},
  booktitle    = {Computer Safety, Reliability, and Security - {SAFECOMP} 2017 Workshops,
                  ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September
                  12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10489},
  pages        = {286--297},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66284-8\_24},
  doi          = {10.1007/978-3-319-66284-8\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/MartinBSMGRM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/AmorimMMSSMWKK17,
  author       = {Tiago Amorim and
                  Helmut Martin and
                  Zhendong Ma and
                  Christoph Schmittner and
                  Daniel Schneider and
                  Georg Macher and
                  Bernhard Winkler and
                  Martin Krammer and
                  Christian Kreiner},
  editor       = {Stefano Tonetta and
                  Erwin Schoitsch and
                  Friedemann Bitsch},
  title        = {Systematic Pattern Approach for Safety and Security Co-engineering
                  in the Automotive Domain},
  booktitle    = {Computer Safety, Reliability, and Security - 36th International Conference,
                  {SAFECOMP} 2017, Trento, Italy, September 13-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10488},
  pages        = {329--342},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66266-4\_22},
  doi          = {10.1007/978-3-319-66266-4\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/AmorimMMSSMWKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/MaSPSG17,
  author       = {Zhendong Ma and
                  Walter Seb{\"{o}}ck and
                  Bettina Pospisil and
                  Christoph Schmittner and
                  Thomas Gruber},
  editor       = {Stefano Tonetta and
                  Erwin Schoitsch and
                  Friedemann Bitsch},
  title        = {Security and Privacy in the Automotive Domain: {A} Technical and Social
                  Analysis},
  booktitle    = {Computer Safety, Reliability, and Security - {SAFECOMP} 2017 Workshops,
                  ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September
                  12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10489},
  pages        = {427--434},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66284-8\_36},
  doi          = {10.1007/978-3-319-66284-8\_36},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safecomp/MaSPSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/SchmittnerMGS17,
  author       = {Christoph Schmittner and
                  Zhendong Ma and
                  Thomas Gruber and
                  Erwin Schoitsch},
  title        = {Safety and Security Co-engineering of Connected, Intelligent, and
                  Automated Vehicles},
  journal      = {{ERCIM} News},
  volume       = {2017},
  number       = {109},
  year         = {2017},
  url          = {https://ercim-news.ercim.eu/en109/special/safety-and-security-co-engineering-of-connected-intelligent-and-automated-vehicles},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ercim/SchmittnerMGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/SchmittnerMRDP16,
  author       = {Christoph Schmittner and
                  Zhendong Ma and
                  Carolina Reyes and
                  Oliver Dillinger and
                  Peter P. Puschner},
  editor       = {Amund Skavhaug and
                  J{\'{e}}r{\'{e}}mie Guiochet and
                  Erwin Schoitsch and
                  Friedemann Bitsch},
  title        = {Using {SAE} {J3061} for Automotive Security Requirement Engineering},
  booktitle    = {Computer Safety, Reliability, and Security - {SAFECOMP} 2016 Workshops,
                  ASSURE, DECSoS, SASSUR, and TIPS, Trondheim, Norway, September 20,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9923},
  pages        = {157--170},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45480-1\_13},
  doi          = {10.1007/978-3-319-45480-1\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/SchmittnerMRDP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/SchmittnerMP16,
  author       = {Christoph Schmittner and
                  Zhendong Ma and
                  Peter P. Puschner},
  editor       = {Amund Skavhaug and
                  J{\'{e}}r{\'{e}}mie Guiochet and
                  Erwin Schoitsch and
                  Friedemann Bitsch},
  title        = {Limitation and Improvement of STPA-Sec for Safety and Security Co-analysis},
  booktitle    = {Computer Safety, Reliability, and Security - {SAFECOMP} 2016 Workshops,
                  ASSURE, DECSoS, SASSUR, and TIPS, Trondheim, Norway, September 20,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9923},
  pages        = {195--209},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45480-1\_16},
  doi          = {10.1007/978-3-319-45480-1\_16},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/SchmittnerMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchmittnerMSG15,
  author       = {Christoph Schmittner and
                  Zhendong Ma and
                  Erwin Schoitsch and
                  Thomas Gruber},
  editor       = {Jianying Zhou and
                  Douglas Jones},
  title        = {A Case Study of {FMVEA} and {CHASSIS} as Safety and Security Co-Analysis
                  Method for Automotive Cyber-physical Systems},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Cyber-Physical System Security,
                  {CPSS} 2015, Singapore, Republic of Singapore, April 14 - March 14,
                  2015},
  pages        = {69--80},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2732198.2732204},
  doi          = {10.1145/2732198.2732204},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchmittnerMSG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emisa/Rinderle-MaMM15,
  author       = {Stefanie Rinderle{-}Ma and
                  Zhendong Ma and
                  Bernhard Madlmayr},
  editor       = {Jens Kolb and
                  Henrik Leopold and
                  Jan Mendling},
  title        = {Using Content Analysis for Privacy Requirement Extraction and Policy
                  Formalization},
  booktitle    = {Enterprise Modelling and Information Systems Architectures, Proceedings
                  of the 6th Int. Workshop on Enterprise Modelling and Information Systems
                  Architectures, {EMISA} 2015, Innsbruck, Austria, September 3-4, 2015},
  series       = {{LNI}},
  volume       = {{P-248}},
  pages        = {93--107},
  publisher    = {{GI}},
  year         = {2015},
  url          = {https://dl.gi.de/handle/20.500.12116/2039},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/emisa/Rinderle-MaMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indin/SchmittnerMS15,
  author       = {Christoph Schmittner and
                  Zhendong Ma and
                  Erwin Schoitsch},
  title        = {Combined safety and security development lifecylce},
  booktitle    = {13th {IEEE} International Conference on Industrial Informatics, {INDIN}
                  2015, Cambridge, United Kingdom, July 22-24, 2015},
  pages        = {1408--1415},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INDIN.2015.7281940},
  doi          = {10.1109/INDIN.2015.7281940},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/indin/SchmittnerMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/modelsward/JaimeMMWHB15,
  author       = {Francisco J. Jaime and
                  Antonio Ma{\~{n}}a and
                  Zhendong Ma and
                  Christian Wagner and
                  Daniel Hovie and
                  Mathias Bossuet},
  editor       = {Slimane Hammoudi and
                  Lu{\'{\i}}s Ferreira Pires and
                  Philippe Desfray and
                  Joaquim Filipe},
  title        = {Building a Privacy Accountable Surveillance System},
  booktitle    = {{MODELSWARD} 2015 - Proceedings of the 3rd International Conference
                  on Model-Driven Engineering and Software Development, ESEO, Angers,
                  Loire Valley, France, 9-11 February, 2015},
  pages        = {646--654},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005401606460654},
  doi          = {10.5220/0005401606460654},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/modelsward/JaimeMMWHB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/PappMB15,
  author       = {Dorottya Papp and
                  Zhendong Ma and
                  Levente Butty{\'{a}}n},
  editor       = {Ali A. Ghorbani and
                  Vicen{\c{c}} Torra and
                  H{\"{u}}seyin Hisil and
                  Ali Miri and
                  Ahmet Koltuksuz and
                  Jie Zhang and
                  Murat Sensoy and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Ibrahim Zincir},
  title        = {Embedded systems security: Threats, vulnerabilities, and attack taxonomy},
  booktitle    = {13th Annual Conference on Privacy, Security and Trust, {PST} 2015,
                  Izmir, Turkey, July 21-23, 2015},
  pages        = {145--152},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/PST.2015.7232966},
  doi          = {10.1109/PST.2015.7232966},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/PappMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/SchmittnerM15,
  author       = {Christoph Schmittner and
                  Zhendong Ma},
  editor       = {Floor Koornneef and
                  Coen van Gulijk},
  title        = {Towards a Framework for Alignment Between Automotive Safety and Security
                  Standards},
  booktitle    = {Computer Safety, Reliability, and Security - {SAFECOMP} 2015 Workshops,
                  ASSURE, DECSoS, ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands,
                  September 22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9338},
  pages        = {133--143},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24249-1\_12},
  doi          = {10.1007/978-3-319-24249-1\_12},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/SchmittnerM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/ChenSMTDJS15,
  author       = {Binbin Chen and
                  Christoph Schmittner and
                  Zhendong Ma and
                  William G. Temple and
                  Xinshu Dong and
                  Douglas L. Jones and
                  William H. Sanders},
  editor       = {Floor Koornneef and
                  Coen van Gulijk},
  title        = {Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical
                  Perspective},
  booktitle    = {Computer Safety, Reliability, and Security - {SAFECOMP} 2015 Workshops,
                  ASSURE, DECSoS, ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands,
                  September 22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9338},
  pages        = {277--290},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24249-1\_24},
  doi          = {10.1007/978-3-319-24249-1\_24},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safecomp/ChenSMTDJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LeitnerMR15,
  author       = {Maria Leitner and
                  Zhendong Ma and
                  Stefanie Rinderle{-}Ma},
  title        = {A Cross-Layer Security Analysis for Process-Aware Information Systems},
  journal      = {CoRR},
  volume       = {abs/1507.03415},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.03415},
  eprinttype    = {arXiv},
  eprint       = {1507.03415},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LeitnerMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/SchmittnerMG15,
  author       = {Christoph Schmittner and
                  Zhendong Ma and
                  Thomas Gruber},
  title        = {Combining Safety and Security Engineering for Trustworthy Cyber-Physical
                  Systems},
  journal      = {{ERCIM} News},
  volume       = {2015},
  number       = {102},
  year         = {2015},
  url          = {http://ercim-news.ercim.eu/en102/special/combining-safety-and-security-engineering-for-trustworthy-cyber-physical-systems},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ercim/SchmittnerMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HochreinerFMKSW14,
  author       = {Christoph Hochreiner and
                  Peter Fr{\"{u}}hwirt and
                  Zhendong Ma and
                  Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  title        = {Genie in a Model? Why Model Driven Security will not secure your Web
                  Application},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {3},
  pages        = {44--62},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.09.31.044},
  doi          = {10.22667/JOWUA.2014.09.31.044},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HochreinerFMKSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/MaBJCKGMJTGHBCH14,
  author       = {Zhendong Ma and
                  Denis Butin and
                  Francisco J. Jaime and
                  Fanny Coudert and
                  Antonio Kung and
                  Claire Gayrel and
                  Antonio Ma{\~{n}}a and
                  Christophe Jouvray and
                  Nathalie Trussart and
                  Nathalie Grandjean and
                  V{\'{\i}}ctor Manuel Hidalgo and
                  Mathias Bossuet and
                  Fernando Casado and
                  M. Carmen Hidalgo},
  editor       = {Bart Preneel and
                  Demosthenes Ikonomou},
  title        = {Towards a Multidisciplinary Framework to Include Privacy in the Design
                  of Video Surveillance Systems},
  booktitle    = {Privacy Technologies and Policy - Second Annual Privacy Forum, {APF}
                  2014, Athens, Greece, May 20-21, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8450},
  pages        = {101--116},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06749-0\_7},
  doi          = {10.1007/978-3-319-06749-0\_7},
  timestamp    = {Tue, 17 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apf/MaBJCKGMJTGHBCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccve/SchmittnerMG14,
  author       = {Christoph Schmittner and
                  Zhendong Ma and
                  Thomas Gruber},
  title        = {Standardization challenges for safety and security of connected, automated
                  and intelligent vehicles},
  booktitle    = {International Conference on Connected Vehicles and Expo, {ICCVE} 2014,
                  Vienna, Austria, November 3-7, 2014},
  pages        = {941--942},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICCVE.2014.7297695},
  doi          = {10.1109/ICCVE.2014.7297695},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccve/SchmittnerMG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/McLaughlinSSMS14,
  author       = {Kieran McLaughlin and
                  Sakir Sezer and
                  Paul Smith and
                  Zhendong Ma and
                  Florian Skopik},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {{PRECYSE:} Cyber-attack Detection and Response for Industrial Control
                  Systems},
  booktitle    = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten,
                  Austria},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2014},
  url          = {http://ewic.bcs.org/content/ConWebDoc/53233},
  timestamp    = {Mon, 18 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/McLaughlinSSMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/HochreinerMKSW14,
  author       = {Christoph Hochreiner and
                  Zhendong Ma and
                  Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  editor       = {Linawati and
                  Made Sudiana Mahendra and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Ilsun You},
  title        = {Using Model Driven Security Approaches in Web Application Development},
  booktitle    = {Information and Communication Technology - Second {IFIP} {TC5/8} International
                  Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8407},
  pages        = {419--431},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55032-4\_42},
  doi          = {10.1007/978-3-642-55032-4\_42},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/HochreinerMKSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/SchmittnerMS14,
  author       = {Christoph Schmittner and
                  Zhendong Ma and
                  Paul Smith},
  editor       = {Andrea Bondavalli and
                  Andrea Ceccarelli and
                  Frank Ortmeier},
  title        = {{FMVEA} for Safety and Security Analysis of Intelligent and Cooperative
                  Vehicles},
  booktitle    = {Computer Safety, Reliability, and Security - {SAFECOMP} 2014 Workshops:
                  ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, {SASSUR.} Florence, Italy,
                  September 8-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8696},
  pages        = {282--288},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10557-4\_31},
  doi          = {10.1007/978-3-319-10557-4\_31},
  timestamp    = {Sat, 06 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/SchmittnerMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ei/WagnerMN13,
  author       = {Christian Wagner and
                  Zhendong Ma and
                  Andrea Nowak},
  title        = {Modellgetriebene Entwicklung sicherer Softwaresysteme f{\"{u}}r
                  das {\"{o}}sterreichische E-Government},
  journal      = {Elektrotech. Informationstechnik},
  volume       = {130},
  number       = {4-5},
  pages        = {127--132},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00502-013-0140-6},
  doi          = {10.1007/S00502-013-0140-6},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ei/WagnerMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgc/DoNM13,
  author       = {Hoang Giang Do and
                  Wee Keong Ng and
                  Zhendong Ma},
  title        = {Privacy-Preserving Social Network for an Untrusted Server},
  booktitle    = {2013 International Conference on Cloud and Green Computing, Karlsruhe,
                  Germany, September 30 - October 2, 2013},
  pages        = {472--478},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CGC.2013.80},
  doi          = {10.1109/CGC.2013.80},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cgc/DoNM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/MaS13,
  author       = {Zhendong Ma and
                  Paul Smith},
  editor       = {Eric A. M. Luiijf and
                  Pieter H. Hartel},
  title        = {Determining Risks from Advanced Multi-step Attacks to Critical Information
                  Infrastructures},
  booktitle    = {Critical Information Infrastructures Security - 8th International
                  Workshop, {CRITIS} 2013, Amsterdam, The Netherlands, September 16-18,
                  2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8328},
  pages        = {142--154},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03964-0\_13},
  doi          = {10.1007/978-3-319-03964-0\_13},
  timestamp    = {Sat, 06 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/MaS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/SkopikM12,
  author       = {Florian Skopik and
                  Zhendong Ma},
  editor       = {Xiaoying Bai and
                  Fevzi Belli and
                  Elisa Bertino and
                  Carl K. Chang and
                  Atilla El{\c{c}}i and
                  Cristina Cerschi Seceleanu and
                  Haihua Xie and
                  Mohammad Zulkernine},
  title        = {Attack Vectors to Metering Data in Smart Grids under Security Constraints},
  booktitle    = {36th Annual {IEEE} Computer Software and Applications Conference Workshops,
                  {COMPSAC} 2012, Izmir, Turkey, July 16-20, 2012},
  pages        = {134--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/COMPSACW.2012.34},
  doi          = {10.1109/COMPSACW.2012.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/SkopikM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/futsec/SkopikMSB12,
  author       = {Florian Skopik and
                  Zhendong Ma and
                  Paul Smith and
                  Thomas Bleier},
  editor       = {Nils Aschenbruck and
                  Peter Martini and
                  Michael Meier and
                  Jens T{\"{o}}lle},
  title        = {Designing a Cyber Attack Information System for National Situational
                  Awareness},
  booktitle    = {Future Security - 7th Security Research Conference, Future Security
                  2012, Bonn, Germany, September 4-6, 2012. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {318},
  pages        = {277--288},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33161-9\_42},
  doi          = {10.1007/978-3-642-33161-9\_42},
  timestamp    = {Mon, 18 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/futsec/SkopikMSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1211-3908,
  author       = {Zhendong Ma and
                  Paul Smith and
                  Florian Skopik},
  title        = {Towards a Layered Architectural View for Security Analysis in {SCADA}
                  Systems},
  journal      = {CoRR},
  volume       = {abs/1211.3908},
  year         = {2012},
  url          = {http://arxiv.org/abs/1211.3908},
  eprinttype    = {arXiv},
  eprint       = {1211.3908},
  timestamp    = {Mon, 18 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1211-3908.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Ma2011,
  author       = {Zhendong Ma},
  title        = {Location privacy in vehicular communication systems: a measurement
                  approach},
  school       = {University of Ulm},
  year         = {2011},
  url          = {http://vts.uni-ulm.de/docs/2011/7519/vts\_7519\_10729.pdf},
  urn          = {urn:nbn:de:bsz:289-vts-75190},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Ma2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MaMWB11,
  author       = {Zhendong Ma and
                  J{\"{u}}rgen Mangler and
                  Christian Wagner and
                  Thomas Bleier},
  title        = {Enhance Data Privacy in Service Compositions through a Privacy Proxy},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {615--620},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.94},
  doi          = {10.1109/ARES.2011.94},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MaMWB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/MaKW10,
  author       = {Zhendong Ma and
                  Frank Kargl and
                  Michael Weber},
  title        = {Measuring long-term location privacy in vehicular communication systems},
  journal      = {Comput. Commun.},
  volume       = {33},
  number       = {12},
  pages        = {1414--1427},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.comcom.2010.02.032},
  doi          = {10.1016/J.COMCOM.2010.02.032},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/MaKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/SchaubKMW10,
  author       = {Florian Schaub and
                  Frank Kargl and
                  Zhendong Ma and
                  Michael Weber},
  title        = {V-Tokens for Conditional Pseudonymity in VANETs},
  booktitle    = {2010 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2010, Proceedings, Sydney, Australia, 18-21 April 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WCNC.2010.5506126},
  doi          = {10.1109/WCNC.2010.5506126},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/SchaubKMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/SchaubMK09,
  author       = {Florian Schaub and
                  Zhendong Ma and
                  Frank Kargl},
  title        = {Privacy Requirements in Vehicular Communication Systems},
  booktitle    = {Proceedings of the 12th {IEEE} International Conference on Computational
                  Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
                  29-31, 2009},
  pages        = {139--145},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSE.2009.135},
  doi          = {10.1109/CSE.2009.135},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/SchaubMK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/MaKW09,
  author       = {Zhendong Ma and
                  Frank Kargl and
                  Michael Weber},
  title        = {Measuring location privacy in {V2X} communication systems with accumulated
                  information},
  booktitle    = {{IEEE} 6th International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2009, 12-15 October 2009, Macau (S.A.R.), China},
  pages        = {322--331},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MOBHOC.2009.5336983},
  doi          = {10.1109/MOBHOC.2009.5336983},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/MaKW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0912-5391,
  author       = {Panagiotis Papadimitratos and
                  Levente Butty{\'{a}}n and
                  Tam{\'{a}}s Holczer and
                  Elmar Schoch and
                  Julien Freudiger and
                  Maxim Raya and
                  Zhendong Ma and
                  Frank Kargl and
                  Antonio Kung and
                  Jean{-}Pierre Hubaux},
  title        = {Secure Vehicular Communication Systems: Design and Architecture},
  journal      = {CoRR},
  volume       = {abs/0912.5391},
  year         = {2009},
  url          = {http://arxiv.org/abs/0912.5391},
  eprinttype    = {arXiv},
  eprint       = {0912.5391},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0912-5391.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/PapadimitratosB08,
  author       = {Panagiotis Papadimitratos and
                  Levente Butty{\'{a}}n and
                  Tam{\'{a}}s Holczer and
                  Elmar Schoch and
                  Julien Freudiger and
                  Maxim Raya and
                  Zhendong Ma and
                  Frank Kargl and
                  Antonio Kung and
                  Jean{-}Pierre Hubaux},
  title        = {Secure vehicular communication systems: design and architecture},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {46},
  number       = {11},
  pages        = {100--109},
  year         = {2008},
  url          = {https://doi.org/10.1109/MCOM.2008.4689252},
  doi          = {10.1109/MCOM.2008.4689252},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/PapadimitratosB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/MaKW08,
  author       = {Zhendong Ma and
                  Frank Kargl and
                  Michael Weber},
  title        = {Pseudonym-On-Demand: {A} New Pseudonym Refill Strategy for Vehicular
                  Communications},
  booktitle    = {Proceedings of the 68th {IEEE} Vehicular Technology Conference, {VTC}
                  Fall 2008, 21-24 September 2008, Calgary, Alberta, Canada},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/VETECF.2008.455},
  doi          = {10.1109/VETECF.2008.455},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/MaKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}