Alert button
Picture for Irdin Pekaric

Irdin Pekaric

Alert button

Streamlining Attack Tree Generation: A Fragment-Based Approach

Add code
Bookmark button
Alert button
Oct 01, 2023
Irdin Pekaric, Markus Frick, Jubril Gbolahan Adigun, Raffaela Groner, Thomas Witte, Alexander Raschke, Michael Felderer, Matthias Tichy

Figure 1 for Streamlining Attack Tree Generation: A Fragment-Based Approach
Figure 2 for Streamlining Attack Tree Generation: A Fragment-Based Approach
Figure 3 for Streamlining Attack Tree Generation: A Fragment-Based Approach
Figure 4 for Streamlining Attack Tree Generation: A Fragment-Based Approach
Viaarxiv icon

Towards Model Co-evolution Across Self-Adaptation Steps for Combined Safety and Security Analysis

Add code
Bookmark button
Alert button
Sep 18, 2023
Thomas Witte, Raffaela Groner, Alexander Raschke, Matthias Tichy, Irdin Pekaric, Michael Felderer

Figure 1 for Towards Model Co-evolution Across Self-Adaptation Steps for Combined Safety and Security Analysis
Figure 2 for Towards Model Co-evolution Across Self-Adaptation Steps for Combined Safety and Security Analysis
Figure 3 for Towards Model Co-evolution Across Self-Adaptation Steps for Combined Safety and Security Analysis
Figure 4 for Towards Model Co-evolution Across Self-Adaptation Steps for Combined Safety and Security Analysis
Viaarxiv icon

VULNERLIZER: Cross-analysis Between Vulnerabilities and Software Libraries

Add code
Bookmark button
Alert button
Sep 18, 2023
Irdin Pekaric, Michael Felderer, Philipp Steinmüller

Figure 1 for VULNERLIZER: Cross-analysis Between Vulnerabilities and Software Libraries
Figure 2 for VULNERLIZER: Cross-analysis Between Vulnerabilities and Software Libraries
Figure 3 for VULNERLIZER: Cross-analysis Between Vulnerabilities and Software Libraries
Figure 4 for VULNERLIZER: Cross-analysis Between Vulnerabilities and Software Libraries
Viaarxiv icon

Simulation of Sensor Spoofing Attacks on Unmanned Aerial Vehicles Using the Gazebo Simulator

Add code
Bookmark button
Alert button
Sep 18, 2023
Irdin Pekaric, David Arnold, Michael Felderer

Figure 1 for Simulation of Sensor Spoofing Attacks on Unmanned Aerial Vehicles Using the Gazebo Simulator
Figure 2 for Simulation of Sensor Spoofing Attacks on Unmanned Aerial Vehicles Using the Gazebo Simulator
Figure 3 for Simulation of Sensor Spoofing Attacks on Unmanned Aerial Vehicles Using the Gazebo Simulator
Figure 4 for Simulation of Sensor Spoofing Attacks on Unmanned Aerial Vehicles Using the Gazebo Simulator
Viaarxiv icon