Roland Rieke
Roland Rieke
Verified email at sit.fraunhofer.de - Homepage
Title
Cited by
Cited by
Year
Security requirements for automotive on-board networks based on dark-side scenarios
A Ruddle, D Ward, B Weyl, S Idrees, Y Roudier, M Friedewald, ...
EVITA Deliverable D 2 (3), 2009
84*2009
The SH-Verification Tool—Abstraction-Based Verification of Co-operating Systems
P Ochsenschläger, J Repp, R Rieke, U Nitsche
Formal Aspects of Computing 10 (4), 381-404, 1998
521998
Fraud detection in mobile payments utilizing process behavior analysis
R Rieke, M Zhdanova, J Repp, R Giot, C Gaber
2013 International Conference on Availability, Reliability and Security, 662-669, 2013
392013
The SH-Verification Tool.
P Ochsenschläger, J Repp, R Rieke
FLAIRS Conference, 18-22, 2000
302000
Identification of security requirements in systems of systems by functional security analysis
A Fuchs, R Rieke
Architecting dependable systems VII, 74-96, 2010
29*2010
Abstraction and composition: a verification method for co-operating systems
P Ochsenschläger, J Repp, R Rieke
Journal of Experimental & Theoretical Artificial Intelligence 12 (4), 447-459, 2000
272000
Identification of security requirements in systems of systems by functional security analysis
A Fuchs, R Rieke
Architecting dependable systems VII, 74-96, 2010
242010
Security and reliability requirements for advanced security event management
R Rieke, L Coppolino, A Hutchison, E Prieto, C Gaber
International Conference on Mathematical Methods, Models, and Architectures …, 2012
212012
A trusted information agent for security information and event management
L Coppolino, M Jäger, N Kuntze, R Rieke
ICONS 2012, The Seventh International Conference on Systems, 6-12, 2012
212012
Predictive security analysis for event-driven processes
R Rieke, Z Stoynova
International Conference on Mathematical Methods, Models, and Architectures …, 2010
202010
Tool based formal modelling, analysis and visualisation of enterprise network vulnerabilities utilising attack graph exploration
R Rieke
Eicar 2004 Conference CD-rom: Best Paper Proceedings, Copenhagen, EICAR eV, 2004
202004
MASSIF: A promising solution to enhance olympic games IT security
E Prieto, R Diaz, L Romano, R Rieke, M Achemlal
Global Security, Safety and Sustainability & e-Democracy, 139-147, 2011
172011
Modelling and analysing network security policies in a given vulnerability setting
R Rieke
International Workshop on Critical Information Infrastructures Security, 67-78, 2006
172006
No smurfs: Revealing fraud chains in mobile money transfers
M Zhdanova, J Repp, R Rieke, C Gaber, B Hemery
2014 Ninth International Conference on Availability, Reliability and …, 2014
162014
Monitoring security compliance of critical processes
R Rieke, J Repp, M Zhdanova, J Eichler
2014 22nd Euromicro International Conference on Parallel, Distributed, and …, 2014
152014
Model-based situational security analysis
J Eichler, R Rieke
Proceedings of the 6th International Workshop on Models@run.time at the ACM …, 2011
152011
Behavior analysis for safety and security in automotive systems
R Rieke, M Seidemann, EK Talla, D Zelle, B Seeger
2017 25th Euromicro International Conference on Parallel, Distributed and …, 2017
132017
Model-based security event management
J Schütte, R Rieke, T Winkelvos
International Conference on Mathematical Methods, Models, and Architectures …, 2012
132012
Abstraction-based analysis of known and unknown vulnerabilities of critical information infrastructures
R Rieke
International Journal of System of Systems Engineering 1 (1-2), 59-77, 2008
132008
An update logic for information systems
MA Khan, M Banerjee, R Rieke
International journal of approximate reasoning 55 (1), 436-456, 2014
112014
The system can't perform the operation now. Try again later.
Articles 1–20