default search action
BibTeX records: Zhendong Ma
@article{DBLP:journals/corr/abs-2201-02601, author = {Zhendong Ma}, title = {Apples and Cars: a Comparison of Security}, journal = {CoRR}, volume = {abs/2201.02601}, year = {2022}, url = {https://arxiv.org/abs/2201.02601}, eprinttype = {arXiv}, eprint = {2201.02601}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-02601.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/MartinMSWKSAMK20, author = {Helmut Martin and Zhendong Ma and Christoph Schmittner and Bernhard Winkler and Martin Krammer and Daniel Schneider and Tiago Amorim and Georg Macher and Christian Kreiner}, title = {Combined automotive safety and security pattern engineering approach}, journal = {Reliab. Eng. Syst. Saf.}, volume = {198}, pages = {106773}, year = {2020}, url = {https://doi.org/10.1016/j.ress.2019.106773}, doi = {10.1016/J.RESS.2019.106773}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ress/MartinMSWKSAMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijspm/FanZYFMG19, author = {Rang{-}Lin Fan and Chu{-}Yuan Zhang and Fang Yin and Cheng{-}Cheng Feng and Zhendong Ma and Hua{-}Bing Gong}, title = {Finite element analysis for engine crankshaft torsional stiffness}, journal = {Int. J. Simul. Process. Model.}, volume = {14}, number = {4}, pages = {389--396}, year = {2019}, url = {https://doi.org/10.1504/IJSPM.2019.103590}, doi = {10.1504/IJSPM.2019.103590}, timestamp = {Thu, 07 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijspm/FanZYFMG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cecc/MarksteinerM19, author = {Stefan Marksteiner and Zhendong Ma}, title = {Approaching the Automation of Cyber Security Testing of Connected Vehicles}, booktitle = {Proceedings of the Third Central European Cybersecurity Conference, {CECC} 2019, Munich, Germany, November 14-15, 2019}, pages = {22:1--22:3}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3360664.3360729}, doi = {10.1145/3360664.3360729}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cecc/MarksteinerM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vehits/VasenevSHMSKL19, author = {Alexandr Vasenev and Florian Stahl and Hayk Hamazaryan and Zhendong Ma and Lijun Shan and Joerg Kemmerich and Claire Loiseaux}, editor = {Oleg Gusikhin and Markus Helfert}, title = {Practical Security and Privacy Threat Analysis in the Automotive Domain: Long Term Support Scenario for Over-the-Air Updates}, booktitle = {Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems, {VEHITS} 2019, Heraklion, Crete, Greece, May 3-5, 2019}, pages = {550--555}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007764205500555}, doi = {10.5220/0007764205500555}, timestamp = {Thu, 06 Jun 2019 13:06:22 +0200}, biburl = {https://dblp.org/rec/conf/vehits/VasenevSHMSKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-06589, author = {Stefan Marksteiner and Zhendong Ma}, title = {Approaching the Automation of Cyber Security Testing of Connected Vehicles}, journal = {CoRR}, volume = {abs/1911.06589}, year = {2019}, url = {http://arxiv.org/abs/1911.06589}, eprinttype = {arXiv}, eprint = {1911.06589}, timestamp = {Mon, 02 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-06589.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurospi/SchmittnerGM18, author = {Christoph Schmittner and Gerhard Griessnig and Zhendong Ma}, editor = {Xabier Larrucea and Izaskun Santamar{\'{\i}}a and Rory V. O'Connor and Richard Messnarz}, title = {Status of the Development of {ISO/SAE} 21434}, booktitle = {Systems, Software and Services Process Improvement - 25th European Conference, EuroSPI 2018, Bilbao, Spain, September 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {896}, pages = {504--513}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97925-0\_43}, doi = {10.1007/978-3-319-97925-0\_43}, timestamp = {Tue, 25 Jan 2022 13:33:43 +0100}, biburl = {https://dblp.org/rec/conf/eurospi/SchmittnerGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/SchmittnerHM18, author = {Christoph Schmittner and Christian Hirsch and Zhendong Ma}, title = {Smart Farming: From Automated Machinery to the Cloud}, journal = {{ERCIM} News}, volume = {2018}, number = {113}, year = {2018}, url = {https://ercim-news.ercim.eu/en113/special/smart-farming-from-automated-machinery-to-the-cloud}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/SchmittnerHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/MetayerBCGJJKMM17, author = {Daniel Le M{\'{e}}tayer and Mathias Bossuet and Fanny Coudert and Claire Gayrel and Francisco J. Jaime and Christophe Jouvray and Antonio Kung and Zhendong Ma and Antonio Ma{\~{n}}a}, title = {Interdisciplinarity in practice: Challenges and benefits for privacy research}, journal = {Comput. Law Secur. Rev.}, volume = {33}, number = {6}, pages = {864--869}, year = {2017}, url = {https://doi.org/10.1016/j.clsr.2017.05.020}, doi = {10.1016/J.CLSR.2017.05.020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/MetayerBCGJJKMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PappBM17, author = {Dorottya Papp and Levente Butty{\'{a}}n and Zhendong Ma}, title = {Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {64:1--64:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3105821}, doi = {10.1145/3098954.3105821}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/PappBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MaierMB17, author = {Patrik Maier and Zhendong Ma and Roderick Bloem}, title = {Towards a Secure {SCRUM} Process for Agile Web Application Development}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {73:1--73:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3103171}, doi = {10.1145/3098954.3103171}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/MaierMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etfa/SchmittnerMRA17, author = {Christoph Schmittner and Zhendong Ma and Thomas Ruprechter and Andreas Aldrian}, title = {Practical safe, secure and reliable machine-to-machine connectivity for cyber-physical-production systems}, booktitle = {22nd {IEEE} International Conference on Emerging Technologies and Factory Automation, {ETFA} 2017, Limassol, Cyprus, September 12-15, 2017}, pages = {1--4}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ETFA.2017.8247726}, doi = {10.1109/ETFA.2017.8247726}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/etfa/SchmittnerMRA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/MaHSP17, author = {Zhendong Ma and Aleksandar Hudic and Abdelkader Magdy Shaaban and S{\'{a}}ndor Pl{\'{o}}sz}, title = {Security Viewpoint in a Reference Architecture Model for Cyber-Physical Production Systems}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2017, Paris, France, April 26-28, 2017}, pages = {153--159}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSPW.2017.65}, doi = {10.1109/EUROSPW.2017.65}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/MaHSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/WinterRGFM17, author = {Karolin Winter and Stefanie Rinderle{-}Ma and Wilfried Grossmann and Ingo Feinerer and Zhendong Ma}, editor = {Herv{\'{e}} Panetto and Christophe Debruyne and Walid Gaaloul and Mike P. Papazoglou and Adrian Paschke and Claudio Agostino Ardagna and Robert Meersman}, title = {Characterizing Regulatory Documents and Guidelines Based on Text Mining}, booktitle = {On the Move to Meaningful Internet Systems. {OTM} 2017 Conferences - Confederated International Conferences: CoopIS, C{\&}TC, and {ODBASE} 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10573}, pages = {3--20}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69462-7\_1}, doi = {10.1007/978-3-319-69462-7\_1}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/WinterRGFM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/MartinBSMGRM17, author = {Helmut Martin and Robert Bramberger and Christoph Schmittner and Zhendong Ma and Thomas Gruber and Alejandra Ruiz and Georg Macher}, editor = {Stefano Tonetta and Erwin Schoitsch and Friedemann Bitsch}, title = {Safety and Security Co-engineering and Argumentation Framework}, booktitle = {Computer Safety, Reliability, and Security - {SAFECOMP} 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10489}, pages = {286--297}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66284-8\_24}, doi = {10.1007/978-3-319-66284-8\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/MartinBSMGRM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/AmorimMMSSMWKK17, author = {Tiago Amorim and Helmut Martin and Zhendong Ma and Christoph Schmittner and Daniel Schneider and Georg Macher and Bernhard Winkler and Martin Krammer and Christian Kreiner}, editor = {Stefano Tonetta and Erwin Schoitsch and Friedemann Bitsch}, title = {Systematic Pattern Approach for Safety and Security Co-engineering in the Automotive Domain}, booktitle = {Computer Safety, Reliability, and Security - 36th International Conference, {SAFECOMP} 2017, Trento, Italy, September 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10488}, pages = {329--342}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66266-4\_22}, doi = {10.1007/978-3-319-66266-4\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/AmorimMMSSMWKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/MaSPSG17, author = {Zhendong Ma and Walter Seb{\"{o}}ck and Bettina Pospisil and Christoph Schmittner and Thomas Gruber}, editor = {Stefano Tonetta and Erwin Schoitsch and Friedemann Bitsch}, title = {Security and Privacy in the Automotive Domain: {A} Technical and Social Analysis}, booktitle = {Computer Safety, Reliability, and Security - {SAFECOMP} 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10489}, pages = {427--434}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66284-8\_36}, doi = {10.1007/978-3-319-66284-8\_36}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safecomp/MaSPSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/SchmittnerMGS17, author = {Christoph Schmittner and Zhendong Ma and Thomas Gruber and Erwin Schoitsch}, title = {Safety and Security Co-engineering of Connected, Intelligent, and Automated Vehicles}, journal = {{ERCIM} News}, volume = {2017}, number = {109}, year = {2017}, url = {https://ercim-news.ercim.eu/en109/special/safety-and-security-co-engineering-of-connected-intelligent-and-automated-vehicles}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ercim/SchmittnerMGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/SchmittnerMRDP16, author = {Christoph Schmittner and Zhendong Ma and Carolina Reyes and Oliver Dillinger and Peter P. Puschner}, editor = {Amund Skavhaug and J{\'{e}}r{\'{e}}mie Guiochet and Erwin Schoitsch and Friedemann Bitsch}, title = {Using {SAE} {J3061} for Automotive Security Requirement Engineering}, booktitle = {Computer Safety, Reliability, and Security - {SAFECOMP} 2016 Workshops, ASSURE, DECSoS, SASSUR, and TIPS, Trondheim, Norway, September 20, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9923}, pages = {157--170}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45480-1\_13}, doi = {10.1007/978-3-319-45480-1\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/SchmittnerMRDP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/SchmittnerMP16, author = {Christoph Schmittner and Zhendong Ma and Peter P. Puschner}, editor = {Amund Skavhaug and J{\'{e}}r{\'{e}}mie Guiochet and Erwin Schoitsch and Friedemann Bitsch}, title = {Limitation and Improvement of STPA-Sec for Safety and Security Co-analysis}, booktitle = {Computer Safety, Reliability, and Security - {SAFECOMP} 2016 Workshops, ASSURE, DECSoS, SASSUR, and TIPS, Trondheim, Norway, September 20, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9923}, pages = {195--209}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45480-1\_16}, doi = {10.1007/978-3-319-45480-1\_16}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/SchmittnerMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchmittnerMSG15, author = {Christoph Schmittner and Zhendong Ma and Erwin Schoitsch and Thomas Gruber}, editor = {Jianying Zhou and Douglas Jones}, title = {A Case Study of {FMVEA} and {CHASSIS} as Safety and Security Co-Analysis Method for Automotive Cyber-physical Systems}, booktitle = {Proceedings of the 1st {ACM} Workshop on Cyber-Physical System Security, {CPSS} 2015, Singapore, Republic of Singapore, April 14 - March 14, 2015}, pages = {69--80}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2732198.2732204}, doi = {10.1145/2732198.2732204}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchmittnerMSG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emisa/Rinderle-MaMM15, author = {Stefanie Rinderle{-}Ma and Zhendong Ma and Bernhard Madlmayr}, editor = {Jens Kolb and Henrik Leopold and Jan Mendling}, title = {Using Content Analysis for Privacy Requirement Extraction and Policy Formalization}, booktitle = {Enterprise Modelling and Information Systems Architectures, Proceedings of the 6th Int. Workshop on Enterprise Modelling and Information Systems Architectures, {EMISA} 2015, Innsbruck, Austria, September 3-4, 2015}, series = {{LNI}}, volume = {{P-248}}, pages = {93--107}, publisher = {{GI}}, year = {2015}, url = {https://dl.gi.de/handle/20.500.12116/2039}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/emisa/Rinderle-MaMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indin/SchmittnerMS15, author = {Christoph Schmittner and Zhendong Ma and Erwin Schoitsch}, title = {Combined safety and security development lifecylce}, booktitle = {13th {IEEE} International Conference on Industrial Informatics, {INDIN} 2015, Cambridge, United Kingdom, July 22-24, 2015}, pages = {1408--1415}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INDIN.2015.7281940}, doi = {10.1109/INDIN.2015.7281940}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/indin/SchmittnerMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/modelsward/JaimeMMWHB15, author = {Francisco J. Jaime and Antonio Ma{\~{n}}a and Zhendong Ma and Christian Wagner and Daniel Hovie and Mathias Bossuet}, editor = {Slimane Hammoudi and Lu{\'{\i}}s Ferreira Pires and Philippe Desfray and Joaquim Filipe}, title = {Building a Privacy Accountable Surveillance System}, booktitle = {{MODELSWARD} 2015 - Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {646--654}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005401606460654}, doi = {10.5220/0005401606460654}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/modelsward/JaimeMMWHB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/PappMB15, author = {Dorottya Papp and Zhendong Ma and Levente Butty{\'{a}}n}, editor = {Ali A. Ghorbani and Vicen{\c{c}} Torra and H{\"{u}}seyin Hisil and Ali Miri and Ahmet Koltuksuz and Jie Zhang and Murat Sensoy and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Ibrahim Zincir}, title = {Embedded systems security: Threats, vulnerabilities, and attack taxonomy}, booktitle = {13th Annual Conference on Privacy, Security and Trust, {PST} 2015, Izmir, Turkey, July 21-23, 2015}, pages = {145--152}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/PST.2015.7232966}, doi = {10.1109/PST.2015.7232966}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/PappMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/SchmittnerM15, author = {Christoph Schmittner and Zhendong Ma}, editor = {Floor Koornneef and Coen van Gulijk}, title = {Towards a Framework for Alignment Between Automotive Safety and Security Standards}, booktitle = {Computer Safety, Reliability, and Security - {SAFECOMP} 2015 Workshops, ASSURE, DECSoS, ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9338}, pages = {133--143}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24249-1\_12}, doi = {10.1007/978-3-319-24249-1\_12}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/SchmittnerM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/ChenSMTDJS15, author = {Binbin Chen and Christoph Schmittner and Zhendong Ma and William G. Temple and Xinshu Dong and Douglas L. Jones and William H. Sanders}, editor = {Floor Koornneef and Coen van Gulijk}, title = {Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective}, booktitle = {Computer Safety, Reliability, and Security - {SAFECOMP} 2015 Workshops, ASSURE, DECSoS, ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9338}, pages = {277--290}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24249-1\_24}, doi = {10.1007/978-3-319-24249-1\_24}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safecomp/ChenSMTDJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LeitnerMR15, author = {Maria Leitner and Zhendong Ma and Stefanie Rinderle{-}Ma}, title = {A Cross-Layer Security Analysis for Process-Aware Information Systems}, journal = {CoRR}, volume = {abs/1507.03415}, year = {2015}, url = {http://arxiv.org/abs/1507.03415}, eprinttype = {arXiv}, eprint = {1507.03415}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LeitnerMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/SchmittnerMG15, author = {Christoph Schmittner and Zhendong Ma and Thomas Gruber}, title = {Combining Safety and Security Engineering for Trustworthy Cyber-Physical Systems}, journal = {{ERCIM} News}, volume = {2015}, number = {102}, year = {2015}, url = {http://ercim-news.ercim.eu/en102/special/combining-safety-and-security-engineering-for-trustworthy-cyber-physical-systems}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ercim/SchmittnerMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HochreinerFMKSW14, author = {Christoph Hochreiner and Peter Fr{\"{u}}hwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl}, title = {Genie in a Model? Why Model Driven Security will not secure your Web Application}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {3}, pages = {44--62}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.09.31.044}, doi = {10.22667/JOWUA.2014.09.31.044}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HochreinerFMKSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apf/MaBJCKGMJTGHBCH14, author = {Zhendong Ma and Denis Butin and Francisco J. Jaime and Fanny Coudert and Antonio Kung and Claire Gayrel and Antonio Ma{\~{n}}a and Christophe Jouvray and Nathalie Trussart and Nathalie Grandjean and V{\'{\i}}ctor Manuel Hidalgo and Mathias Bossuet and Fernando Casado and M. Carmen Hidalgo}, editor = {Bart Preneel and Demosthenes Ikonomou}, title = {Towards a Multidisciplinary Framework to Include Privacy in the Design of Video Surveillance Systems}, booktitle = {Privacy Technologies and Policy - Second Annual Privacy Forum, {APF} 2014, Athens, Greece, May 20-21, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8450}, pages = {101--116}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06749-0\_7}, doi = {10.1007/978-3-319-06749-0\_7}, timestamp = {Tue, 17 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apf/MaBJCKGMJTGHBCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccve/SchmittnerMG14, author = {Christoph Schmittner and Zhendong Ma and Thomas Gruber}, title = {Standardization challenges for safety and security of connected, automated and intelligent vehicles}, booktitle = {International Conference on Connected Vehicles and Expo, {ICCVE} 2014, Vienna, Austria, November 3-7, 2014}, pages = {941--942}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICCVE.2014.7297695}, doi = {10.1109/ICCVE.2014.7297695}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccve/SchmittnerMG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/McLaughlinSSMS14, author = {Kieran McLaughlin and Sakir Sezer and Paul Smith and Zhendong Ma and Florian Skopik}, editor = {Helge Janicke and Kevin I. Jones}, title = {{PRECYSE:} Cyber-attack Detection and Response for Industrial Control Systems}, booktitle = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten, Austria}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2014}, url = {http://ewic.bcs.org/content/ConWebDoc/53233}, timestamp = {Mon, 18 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/McLaughlinSSMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/HochreinerMKSW14, author = {Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl}, editor = {Linawati and Made Sudiana Mahendra and Erich J. Neuhold and A Min Tjoa and Ilsun You}, title = {Using Model Driven Security Approaches in Web Application Development}, booktitle = {Information and Communication Technology - Second {IFIP} {TC5/8} International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8407}, pages = {419--431}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55032-4\_42}, doi = {10.1007/978-3-642-55032-4\_42}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/HochreinerMKSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/SchmittnerMS14, author = {Christoph Schmittner and Zhendong Ma and Paul Smith}, editor = {Andrea Bondavalli and Andrea Ceccarelli and Frank Ortmeier}, title = {{FMVEA} for Safety and Security Analysis of Intelligent and Cooperative Vehicles}, booktitle = {Computer Safety, Reliability, and Security - {SAFECOMP} 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, {SASSUR.} Florence, Italy, September 8-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8696}, pages = {282--288}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10557-4\_31}, doi = {10.1007/978-3-319-10557-4\_31}, timestamp = {Sat, 06 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/SchmittnerMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ei/WagnerMN13, author = {Christian Wagner and Zhendong Ma and Andrea Nowak}, title = {Modellgetriebene Entwicklung sicherer Softwaresysteme f{\"{u}}r das {\"{o}}sterreichische E-Government}, journal = {Elektrotech. Informationstechnik}, volume = {130}, number = {4-5}, pages = {127--132}, year = {2013}, url = {https://doi.org/10.1007/s00502-013-0140-6}, doi = {10.1007/S00502-013-0140-6}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ei/WagnerMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgc/DoNM13, author = {Hoang Giang Do and Wee Keong Ng and Zhendong Ma}, title = {Privacy-Preserving Social Network for an Untrusted Server}, booktitle = {2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30 - October 2, 2013}, pages = {472--478}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CGC.2013.80}, doi = {10.1109/CGC.2013.80}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cgc/DoNM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/MaS13, author = {Zhendong Ma and Paul Smith}, editor = {Eric A. M. Luiijf and Pieter H. Hartel}, title = {Determining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures}, booktitle = {Critical Information Infrastructures Security - 8th International Workshop, {CRITIS} 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8328}, pages = {142--154}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03964-0\_13}, doi = {10.1007/978-3-319-03964-0\_13}, timestamp = {Sat, 06 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/MaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/SkopikM12, author = {Florian Skopik and Zhendong Ma}, editor = {Xiaoying Bai and Fevzi Belli and Elisa Bertino and Carl K. Chang and Atilla El{\c{c}}i and Cristina Cerschi Seceleanu and Haihua Xie and Mohammad Zulkernine}, title = {Attack Vectors to Metering Data in Smart Grids under Security Constraints}, booktitle = {36th Annual {IEEE} Computer Software and Applications Conference Workshops, {COMPSAC} 2012, Izmir, Turkey, July 16-20, 2012}, pages = {134--139}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/COMPSACW.2012.34}, doi = {10.1109/COMPSACW.2012.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/SkopikM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/futsec/SkopikMSB12, author = {Florian Skopik and Zhendong Ma and Paul Smith and Thomas Bleier}, editor = {Nils Aschenbruck and Peter Martini and Michael Meier and Jens T{\"{o}}lle}, title = {Designing a Cyber Attack Information System for National Situational Awareness}, booktitle = {Future Security - 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings}, series = {Communications in Computer and Information Science}, volume = {318}, pages = {277--288}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33161-9\_42}, doi = {10.1007/978-3-642-33161-9\_42}, timestamp = {Mon, 18 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/futsec/SkopikMSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1211-3908, author = {Zhendong Ma and Paul Smith and Florian Skopik}, title = {Towards a Layered Architectural View for Security Analysis in {SCADA} Systems}, journal = {CoRR}, volume = {abs/1211.3908}, year = {2012}, url = {http://arxiv.org/abs/1211.3908}, eprinttype = {arXiv}, eprint = {1211.3908}, timestamp = {Mon, 18 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1211-3908.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/de/Ma2011, author = {Zhendong Ma}, title = {Location privacy in vehicular communication systems: a measurement approach}, school = {University of Ulm}, year = {2011}, url = {http://vts.uni-ulm.de/docs/2011/7519/vts\_7519\_10729.pdf}, urn = {urn:nbn:de:bsz:289-vts-75190}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/de/Ma2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MaMWB11, author = {Zhendong Ma and J{\"{u}}rgen Mangler and Christian Wagner and Thomas Bleier}, title = {Enhance Data Privacy in Service Compositions through a Privacy Proxy}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {615--620}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.94}, doi = {10.1109/ARES.2011.94}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/MaMWB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/MaKW10, author = {Zhendong Ma and Frank Kargl and Michael Weber}, title = {Measuring long-term location privacy in vehicular communication systems}, journal = {Comput. Commun.}, volume = {33}, number = {12}, pages = {1414--1427}, year = {2010}, url = {https://doi.org/10.1016/j.comcom.2010.02.032}, doi = {10.1016/J.COMCOM.2010.02.032}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/MaKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/SchaubKMW10, author = {Florian Schaub and Frank Kargl and Zhendong Ma and Michael Weber}, title = {V-Tokens for Conditional Pseudonymity in VANETs}, booktitle = {2010 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2010, Proceedings, Sydney, Australia, 18-21 April 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WCNC.2010.5506126}, doi = {10.1109/WCNC.2010.5506126}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/SchaubKMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/SchaubMK09, author = {Florian Schaub and Zhendong Ma and Frank Kargl}, title = {Privacy Requirements in Vehicular Communication Systems}, booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August 29-31, 2009}, pages = {139--145}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSE.2009.135}, doi = {10.1109/CSE.2009.135}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/SchaubMK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/MaKW09, author = {Zhendong Ma and Frank Kargl and Michael Weber}, title = {Measuring location privacy in {V2X} communication systems with accumulated information}, booktitle = {{IEEE} 6th International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2009, 12-15 October 2009, Macau (S.A.R.), China}, pages = {322--331}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MOBHOC.2009.5336983}, doi = {10.1109/MOBHOC.2009.5336983}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/MaKW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0912-5391, author = {Panagiotis Papadimitratos and Levente Butty{\'{a}}n and Tam{\'{a}}s Holczer and Elmar Schoch and Julien Freudiger and Maxim Raya and Zhendong Ma and Frank Kargl and Antonio Kung and Jean{-}Pierre Hubaux}, title = {Secure Vehicular Communication Systems: Design and Architecture}, journal = {CoRR}, volume = {abs/0912.5391}, year = {2009}, url = {http://arxiv.org/abs/0912.5391}, eprinttype = {arXiv}, eprint = {0912.5391}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0912-5391.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/PapadimitratosB08, author = {Panagiotis Papadimitratos and Levente Butty{\'{a}}n and Tam{\'{a}}s Holczer and Elmar Schoch and Julien Freudiger and Maxim Raya and Zhendong Ma and Frank Kargl and Antonio Kung and Jean{-}Pierre Hubaux}, title = {Secure vehicular communication systems: design and architecture}, journal = {{IEEE} Commun. Mag.}, volume = {46}, number = {11}, pages = {100--109}, year = {2008}, url = {https://doi.org/10.1109/MCOM.2008.4689252}, doi = {10.1109/MCOM.2008.4689252}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/PapadimitratosB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/MaKW08, author = {Zhendong Ma and Frank Kargl and Michael Weber}, title = {Pseudonym-On-Demand: {A} New Pseudonym Refill Strategy for Vehicular Communications}, booktitle = {Proceedings of the 68th {IEEE} Vehicular Technology Conference, {VTC} Fall 2008, 21-24 September 2008, Calgary, Alberta, Canada}, pages = {1--5}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/VETECF.2008.455}, doi = {10.1109/VETECF.2008.455}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/MaKW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.