Cited By
View all- Riegler MSametinger JVierhauser MWimmer M(2023)A model-based mode-switching framework based on security vulnerability scoresJournal of Systems and Software10.1016/j.jss.2023.111633200:COnline publication date: 1-Jun-2023
- El-Dosuky MEladl G(2019)DOORchain: Deep Ontology-Based Operation Research to Detect Malicious Smart ContractsNew Knowledge in Information Systems and Technologies10.1007/978-3-030-16181-1_51(538-545)Online publication date: 27-Mar-2019
- Salgueiro PAbreu S(2018)Modelling distributed network attacks with constraintsInternational Journal of Bio-Inspired Computation10.1504/IJBIC.2013.0554495:4(210-225)Online publication date: 21-Dec-2018