Follow
Priv.-Doz. Dr. habil. Andrea Tundis
Priv.-Doz. Dr. habil. Andrea Tundis
German Aerospace Center (DLR) e. V.
No verified email
Title
Cited by
Cited by
Year
Towards security as a service (secaas): On the modeling of security services for cloud computing
A Furfaro, A Garro, A Tundis
2014 international carnahan conference on security technology (ICCST), 1-6, 2014
592014
On the reliability analysis of systems and SoS: The RAMSAS method and related extensions
A Garro, A Tundis
IEEE Systems Journal 9 (1), 232-241, 2014
462014
Formal requirements modeling for simulation-based verification
M Otter, N Thuy, D Bouskela, L Buffoni, H Elmqvist, P Fritzson, A Garro, ...
452015
A review of network vulnerabilities scanning tools: Types, capabilities and functioning
A Tundis, W Mazurczyk, M Mühlhäuser
Proceedings of the 13th international conference on availability …, 2018
432018
A model-based method for system reliability analysis.
A Garro, A Tundis
SpringSim (TMS-DEVS), 2, 2012
372012
Intelligent agents: Multi-agent systems
A Garro, M Mühlhäuser, A Tundis, M Baldoni, C Baroglio, F Bergenti, ...
Encyclopedia of Bioinformatics and Computational Biology: ABC of …, 2018
332018
Detecting and tracking criminals in the real world through an IoT-based system
A Tundis, H Kaleem, M Mühlhäuser
Sensors 20 (13), 3795, 2020
282020
On formal cyber physical system properties modeling: A new temporal logic language and a Modelica-based solution
A Garro, A Tundis, D Bouskela, A Jardin, N Thuy, M Otter, L Buffoni, ...
2016 IEEE International Symposium on Systems Engineering (ISSE), 1-8, 2016
282016
Reliability analysis of an attitude determination and control system (ADCS) through the RAMSAS method
A Garro, J Groß, A Tundis
Journal of Computational Science 5 (3), 439-449, 2014
282014
Formal requirements modeling for cyber-physical systems engineering: An integrated solution based on FORM-L and Modelica
D Bouskela, A Falcone, A Garro, A Jardin, M Otter, N Thuy, A Tundis
Requirements Engineering 27 (1), 1-30, 2022
272022
On the automated assessment of open-source cyber threat intelligence sources
A Tundis, S Ruppert, M Mühlhäuser
Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020
272020
A feature-based model for the identification of electrical devices in smart environments
A Tundis, A Faizan, M Mühlhäuser
Sensors 19 (11), 2611, 2019
252019
Modeling system requirements in modelica: definition and comparison of candidate approaches
A Tundis, L Rogovchenko-Buffoni, P Fritzson, A Garro
5th International Workshop on Equation-Based Object-Oriented Modelling …, 2013
232013
Modeling and simulation for system reliability analysis: The RAMSAS method
A Garro, A Tundis
2012 7th International Conference on System of Systems Engineering (SoSE …, 2012
222012
A multi-language approach towards the identification of suspicious users on social networks
A Tundis, M Mühlhäuser
2017 International Carnahan Conference on Security Technology (ICCST), 1-6, 2017
212017
An integrated toolchain for model based functional safety analysis
L Rogovchenko-Buffoni, A Tundis, MZ Hossain, M Nyberg, P Fritzson
Journal of Computational Science 5 (3), 408-414, 2014
212014
Challenges and available solutions against organized cyber-crime and terrorist networks
A Tundis, F Huber, B Jäger, J Daubert, E Vasilomanolakis, M Mühlhäuser
WIT Transactions on the Built Environment 174, 429-441, 2018
192018
Requirements specification of a cloud service for cyber security compliance analysis
A Furfaro, T Gallo, A Garro, D Sacca, A Tundis
2016 2nd International Conference on Cloud Computing Technologies and …, 2016
192016
Enhancing the RAMSAS method for System Reliability Analysis: an exploitation in the automotive domain
A Garro, A Tundis
Proceedings of the 2nd International Conference on Simulation and Modeling …, 2012
192012
Supporting the identification and the assessment of suspicious users on twitter social media
A Tundis, G Bhatia, A Jain, M Mühlhäuser
2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018
172018
The system can't perform the operation now. Try again later.
Articles 1–20