Security requirements for automotive on-board networks based on dark-side scenarios A Ruddle, B Weyl, S Idrees, Y Roudier, M Friedewald, T Leimbach, ... European Commission, 2009 | 134* | 2009 |
The SH-Verification Tool—Abstraction-Based Verification of Co-operating Systems P Ochsenschläger, J Repp, R Rieke, U Nitsche Formal Aspects of Computing 10, 381-404, 1998 | 68 | 1998 |
Fraud detection in mobile payments utilizing process behavior analysis R Rieke, M Zhdanova, J Repp, R Giot, C Gaber 2013 International Conference on Availability, Reliability and Security, 662-669, 2013 | 63 | 2013 |
Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection I Berger, R Rieke, M Kolomeets, A Chechulin, I Kotenko Computer Security. ESORICS 2018 International Workshops, CyberICPS 2018 and …, 2019 | 51 | 2019 |
Behavior analysis for safety and security in automotive systems R Rieke, M Seidemann, EK Talla, D Zelle, B Seeger 2017 25th Euromicro International Conference on Parallel, Distributed and …, 2017 | 38 | 2017 |
No smurfs: Revealing fraud chains in mobile money transfers M Zhdanova, J Repp, R Rieke, C Gaber, B Hemery 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 38 | 2014 |
Attack surface assessment for cybersecurity engineering in the automotive domain C Plappert, D Zelle, H Gadacz, R Rieke, D Scheuermann, C Krauß 2021 29th Euromicro international conference on parallel, distributed and …, 2021 | 31 | 2021 |
A trusted information agent for security information and event management L Coppolino, M Jäger, N Kuntze, R Rieke ICONS 2012, The Seventh International Conference on Systems, 6-12, 2012 | 31 | 2012 |
Identification of security requirements in systems of systems by functional security analysis A Fuchs, R Rieke Architecting Dependable Systems VII, 74-96, 2010 | 31 | 2010 |
Modelling and analysing network security policies in a given vulnerability setting R Rieke Critical Information Infrastructures Security: First International Workshop …, 2006 | 27 | 2006 |
Abstraction and composition: a verification method for co-operating systems P Ochsenschläger, J Repp, R Rieke Journal of Experimental & Theoretical Artificial Intelligence 12 (4), 447-459, 2000 | 27 | 2000 |
Security and reliability requirements for advanced security event management R Rieke, L Coppolino, A Hutchison, E Prieto, C Gaber Computer Network Security: 6th International Conference on Mathematical …, 2012 | 25 | 2012 |
Predictive security analysis for event-driven processes R Rieke, Z Stoynova Computer Network Security: 5th International Conference on Mathematical …, 2010 | 22 | 2010 |
MASSIF: A promising solution to enhance olympic games IT security E Prieto, R Diaz, L Romano, R Rieke, M Achemlal International Conference on e-Democracy, 139-147, 2011 | 21 | 2011 |
Tool based formal modelling, analysis and visualisation of enterprise network vulnerabilities utilising attack graph exploration R Rieke Proceedings EICAR, 2004 | 21 | 2004 |
ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering D Zelle, C Plappert, R Rieke, D Scheuermann, C Krauß Microprocessors and Microsystems 90, 104461, 2022 | 19 | 2022 |
Model-based security event management J Schütte, R Rieke, T Winkelvos Computer Network Security: 6th International Conference on Mathematical …, 2012 | 19 | 2012 |
Sepad–security evaluation platform for autonomous driving D Zelle, R Rieke, C Plappert, C Krauß, D Levshun, A Chechulin 2020 28th Euromicro International Conference on Parallel, Distributed and …, 2020 | 18 | 2020 |
Monitoring security compliance of critical processes R Rieke, J Repp, M Zhdanova, J Eichler 2014 22nd Euromicro International Conference on Parallel, Distributed, and …, 2014 | 18 | 2014 |
Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models F Fenzl, R Rieke, Y Chevalier, A Dominik, I Kotenko Simulation Modelling Practice and Theory 105, 102143, 2020 | 16 | 2020 |