Seguir
Giedre Sabaliauskaite
Giedre Sabaliauskaite
Computer Science Department, Swansea University, UK
Dirección de correo verificada de swansea.ac.uk - Página principal
Título
Citado por
Citado por
Año
A review on safety failures, security attacks, and available countermeasures for autonomous vehicles
J Cui, LS Liew, G Sabaliauskaite, F Zhou
Ad Hoc Networks 90, 101823, 2019
2632019
Challenges and practices in aligning requirements with verification and validation: a case study of six companies
E Bjarnason, P Runeson, M Borg, M Unterkalmsteiner, E Engström, ...
Empirical software engineering 19, 1809-1855, 2014
1642014
Aligning cyber-physical system safety and security
G Sabaliauskaite, AP Mathur
Complex Systems Design & Management Asia: Designing Smart Cities …, 2015
1132015
Challenges in aligning requirements engineering and verification in a large-scale industrial context
G Sabaliauskaite, A Loconsole, E Engström, M Unterkalmsteiner, ...
Requirements Engineering: Foundation for Software Quality: 16th …, 2010
672010
An experimental comparison of checklist-based reading and perspective-based reading for UML design document inspection
G Sabaliauskaite, F Matsukawa, S Kusumoto, K Inoue
Proceedings International Symposium on Empirical Software Engineering, 148-157, 2002
462002
On the alignment of safety and security for autonomous vehicles
J Cui, G Sabaliauskaite
IARIA CYBER, Barcelona, Spain, 2017
432017
Collaborative analysis framework of safety and security for autonomous vehicles
J Cui, G Sabaliauskaite, LS Liew, F Zhou, B Zhang
IEEE Access 7, 148672-148683, 2019
382019
Integrating autonomous vehicle safety and security analysis using STPA method and the six-step model
G Sabaliauskaite, LS Liew, J Cui
International Journal on Advances in Security 11 (1&2), 160-169, 2018
372018
Assessing defect detection performance of interacting teams in object-oriented design inspection
G Sabaliauskaite, S Kusumoto, K Inoue
Information and Software Technology 46 (13), 875-886, 2004
352004
Integrating six-step model with information flow diagrams for comprehensive analysis of cyber-physical system safety and security
G Sabaliauskaite, S Adepu
2017 IEEE 18th International Symposium on High Assurance Systems Engineering …, 2017
302017
A comprehensive approach, and a case study, for conducting attack detection experiments in cyber–physical systems
G Sabaliauskaite, GS Ng, J Ruths, A Mathur
Robotics and Autonomous Systems 98, 174-191, 2017
292017
Further investigations of reading techniques for object-oriented design inspection
G Sabaliauskaite, F Matsukawa, S Kusumoto, K Inoue
Information and Software Technology 45 (9), 571-585, 2003
252003
US: An Unified Safety and Security Analysis Method for Autonomous Vehicles
J Cui, G Sabaliauskaite
Future of Information and Communication Conference, 600-611, 2018
212018
Intelligent checkers to improve attack detection in cyber physical systems
G Sabaliauskaite, AP Mathur
2013 International Conference on Cyber-Enabled Distributed Computing and …, 2013
212013
A template-based method for the generation of attack trees
J Bryans, LS Liew, HN Nguyen, G Sabaliauskaite, S Shaikh, F Zhou
Information Security Theory and Practice: 13th IFIP WG 11.2 International …, 2020
202020
A six-step model for safety and security analysis of cyber-physical systems
G Sabaliauskaite, S Adepu, A Mathur
Critical Information Infrastructures Security: 11th International Conference …, 2017
182017
Experimental evaluation of stealthy attack detection in a robot
G Sabaliauskaite, GS Ng, J Ruths, A Mathur
2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing …, 2015
182015
Integrated safety and cybersecurity risk analysis of cooperative intelligent transport systems
G Sabaliauskaite, J Cui, LS Liew, F Zhou
2018 Joint 10th International Conference on Soft Computing and Intelligent …, 2018
162018
Cyber-security in robotics and autonomous systems.
V Matellán, T Bonaci, G Sabaliauskaite
Robotics Auton. Syst. 100, 41-42, 2018
122018
Extended metrics to evaluate cost effectiveness of software inspections
G Sabaliauskaite, S Kusumoto, K Inoue
IEICE TRANSACTIONS on Information and Systems 87 (2), 475-480, 2004
122004
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20