default search action
Zhendong Ma
Person information
Other persons with a similar name
- Zhendong Mao (aka: Zhen-Dong Mao)
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c35]Johannes Loebbecke, Thomas van Loo, Juergen Mangler, Zhendong Ma, Tomás Pitner, Stefanie Rinderle-Ma:
BPMS Blockchain Technology Soft Integration For Non-tamperable Logging. BPM (Blockchain and RPA Forum) 2024: 106-120 - 2022
- [i8]Zhendong Ma:
Apples and Cars: a Comparison of Security. CoRR abs/2201.02601 (2022) - 2020
- [j7]Helmut Martin, Zhendong Ma, Christoph Schmittner, Bernhard Winkler, Martin Krammer, Daniel Schneider, Tiago Amorim, Georg Macher, Christian Kreiner:
Combined automotive safety and security pattern engineering approach. Reliab. Eng. Syst. Saf. 198: 106773 (2020)
2010 – 2019
- 2019
- [j6]Rang-Lin Fan, Chu-Yuan Zhang, Fang Yin, Cheng-Cheng Feng, Zhendong Ma, Hua-Bing Gong:
Finite element analysis for engine crankshaft torsional stiffness. Int. J. Simul. Process. Model. 14(4): 389-396 (2019) - [c34]Stefan Marksteiner, Zhendong Ma:
Approaching the Automation of Cyber Security Testing of Connected Vehicles. CECC 2019: 22:1-22:3 - [c33]Alexandr Vasenev, Florian Stahl, Hayk Hamazaryan, Zhendong Ma, Lijun Shan, Joerg Kemmerich, Claire Loiseaux:
Practical Security and Privacy Threat Analysis in the Automotive Domain: Long Term Support Scenario for Over-the-Air Updates. VEHITS 2019: 550-555 - [i7]Stefan Marksteiner, Zhendong Ma:
Approaching the Automation of Cyber Security Testing of Connected Vehicles. CoRR abs/1911.06589 (2019) - 2018
- [c32]Christoph Schmittner, Gerhard Griessnig, Zhendong Ma:
Status of the Development of ISO/SAE 21434. EuroSPI 2018: 504-513 - [i6]Christoph Schmittner, Christian Hirsch, Zhendong Ma:
Smart Farming: From Automated Machinery to the Cloud. ERCIM News 2018(113) (2018) - 2017
- [j5]Daniel Le Métayer, Mathias Bossuet, Fanny Coudert, Claire Gayrel, Francisco J. Jaime, Christophe Jouvray, Antonio Kung, Zhendong Ma, Antonio Maña:
Interdisciplinarity in practice: Challenges and benefits for privacy research. Comput. Law Secur. Rev. 33(6): 864-869 (2017) - [c31]Dorottya Papp, Levente Buttyán, Zhendong Ma:
Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance. ARES 2017: 64:1-64:6 - [c30]Patrik Maier, Zhendong Ma, Roderick Bloem:
Towards a Secure SCRUM Process for Agile Web Application Development. ARES 2017: 73:1-73:8 - [c29]Christoph Schmittner, Zhendong Ma, Thomas Ruprechter, Andreas Aldrian:
Practical safe, secure and reliable machine-to-machine connectivity for cyber-physical-production systems. ETFA 2017: 1-4 - [c28]Zhendong Ma, Aleksandar Hudic, Abdelkader Magdy Shaaban, Sándor Plósz:
Security Viewpoint in a Reference Architecture Model for Cyber-Physical Production Systems. EuroS&P Workshops 2017: 153-159 - [c27]Karolin Winter, Stefanie Rinderle-Ma, Wilfried Grossmann, Ingo Feinerer, Zhendong Ma:
Characterizing Regulatory Documents and Guidelines Based on Text Mining. OTM Conferences (1) 2017: 3-20 - [c26]Helmut Martin, Robert Bramberger, Christoph Schmittner, Zhendong Ma, Thomas Gruber, Alejandra Ruiz, Georg Macher:
Safety and Security Co-engineering and Argumentation Framework. SAFECOMP Workshops 2017: 286-297 - [c25]Tiago Amorim, Helmut Martin, Zhendong Ma, Christoph Schmittner, Daniel Schneider, Georg Macher, Bernhard Winkler, Martin Krammer, Christian Kreiner:
Systematic Pattern Approach for Safety and Security Co-engineering in the Automotive Domain. SAFECOMP 2017: 329-342 - [c24]Zhendong Ma, Walter Seböck, Bettina Pospisil, Christoph Schmittner, Thomas Gruber:
Security and Privacy in the Automotive Domain: A Technical and Social Analysis. SAFECOMP Workshops 2017: 427-434 - [i5]Christoph Schmittner, Zhendong Ma, Thomas Gruber, Erwin Schoitsch:
Safety and Security Co-engineering of Connected, Intelligent, and Automated Vehicles. ERCIM News 2017(109) (2017) - 2016
- [c23]Christoph Schmittner, Zhendong Ma, Carolina Reyes, Oliver Dillinger, Peter P. Puschner:
Using SAE J3061 for Automotive Security Requirement Engineering. SAFECOMP Workshops 2016: 157-170 - [c22]Christoph Schmittner, Zhendong Ma, Peter P. Puschner:
Limitation and Improvement of STPA-Sec for Safety and Security Co-analysis. SAFECOMP Workshops 2016: 195-209 - 2015
- [c21]Christoph Schmittner, Zhendong Ma, Erwin Schoitsch, Thomas Gruber:
A Case Study of FMVEA and CHASSIS as Safety and Security Co-Analysis Method for Automotive Cyber-physical Systems. CPSS@ASIACSS 2015: 69-80 - [c20]Stefanie Rinderle-Ma, Zhendong Ma, Bernhard Madlmayr:
Using Content Analysis for Privacy Requirement Extraction and Policy Formalization. EMISA 2015: 93-107 - [c19]Christoph Schmittner, Zhendong Ma, Erwin Schoitsch:
Combined safety and security development lifecylce. INDIN 2015: 1408-1415 - [c18]Francisco J. Jaime, Antonio Maña, Zhendong Ma, Christian Wagner, Daniel Hovie, Mathias Bossuet:
Building a Privacy Accountable Surveillance System. MODELSWARD 2015: 646-654 - [c17]Dorottya Papp, Zhendong Ma, Levente Buttyán:
Embedded systems security: Threats, vulnerabilities, and attack taxonomy. PST 2015: 145-152 - [c16]Christoph Schmittner, Zhendong Ma:
Towards a Framework for Alignment Between Automotive Safety and Security Standards. SAFECOMP Workshops 2015: 133-143 - [c15]Binbin Chen, Christoph Schmittner, Zhendong Ma, William G. Temple, Xinshu Dong, Douglas L. Jones, William H. Sanders:
Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective. SAFECOMP Workshops 2015: 277-290 - [i4]Maria Leitner, Zhendong Ma, Stefanie Rinderle-Ma:
A Cross-Layer Security Analysis for Process-Aware Information Systems. CoRR abs/1507.03415 (2015) - [i3]Christoph Schmittner, Zhendong Ma, Thomas Gruber:
Combining Safety and Security Engineering for Trustworthy Cyber-Physical Systems. ERCIM News 2015(102) (2015) - 2014
- [j4]Christoph Hochreiner, Peter Frühwirt, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Genie in a Model? Why Model Driven Security will not secure your Web Application. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(3): 44-62 (2014) - [c14]Zhendong Ma, Denis Butin, Francisco J. Jaime, Fanny Coudert, Antonio Kung, Claire Gayrel, Antonio Maña, Christophe Jouvray, Nathalie Trussart, Nathalie Grandjean, Víctor Manuel Hidalgo, Mathias Bossuet, Fernando Casado, M. Carmen Hidalgo:
Towards a Multidisciplinary Framework to Include Privacy in the Design of Video Surveillance Systems. APF 2014: 101-116 - [c13]Christoph Schmittner, Zhendong Ma, Thomas Gruber:
Standardization challenges for safety and security of connected, automated and intelligent vehicles. ICCVE 2014: 941-942 - [c12]Kieran McLaughlin, Sakir Sezer, Paul Smith, Zhendong Ma, Florian Skopik:
PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems. ICS-CSR 2014 - [c11]Christoph Hochreiner, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Using Model Driven Security Approaches in Web Application Development. ICT-EurAsia 2014: 419-431 - [c10]Christoph Schmittner, Zhendong Ma, Paul Smith:
FMVEA for Safety and Security Analysis of Intelligent and Cooperative Vehicles. SAFECOMP Workshops 2014: 282-288 - 2013
- [j3]Christian Wagner, Zhendong Ma, Andrea Nowak:
Modellgetriebene Entwicklung sicherer Softwaresysteme für das österreichische E-Government. Elektrotech. Informationstechnik 130(4-5): 127-132 (2013) - [c9]Hoang Giang Do, Wee Keong Ng, Zhendong Ma:
Privacy-Preserving Social Network for an Untrusted Server. CGC 2013: 472-478 - [c8]Zhendong Ma, Paul Smith:
Determining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures. CRITIS 2013: 142-154 - 2012
- [c7]Florian Skopik, Zhendong Ma:
Attack Vectors to Metering Data in Smart Grids under Security Constraints. COMPSAC Workshops 2012: 134-139 - [c6]Florian Skopik, Zhendong Ma, Paul Smith, Thomas Bleier:
Designing a Cyber Attack Information System for National Situational Awareness. Future Security 2012: 277-288 - [i2]Zhendong Ma, Paul Smith, Florian Skopik:
Towards a Layered Architectural View for Security Analysis in SCADA Systems. CoRR abs/1211.3908 (2012) - 2011
- [b1]Zhendong Ma:
Location privacy in vehicular communication systems: a measurement approach. University of Ulm, 2011, pp. 1-179 - [c5]Zhendong Ma, Jürgen Mangler, Christian Wagner, Thomas Bleier:
Enhance Data Privacy in Service Compositions through a Privacy Proxy. ARES 2011: 615-620 - 2010
- [j2]Zhendong Ma, Frank Kargl, Michael Weber:
Measuring long-term location privacy in vehicular communication systems. Comput. Commun. 33(12): 1414-1427 (2010) - [c4]Florian Schaub, Frank Kargl, Zhendong Ma, Michael Weber:
V-Tokens for Conditional Pseudonymity in VANETs. WCNC 2010: 1-6
2000 – 2009
- 2009
- [c3]Florian Schaub, Zhendong Ma, Frank Kargl:
Privacy Requirements in Vehicular Communication Systems. CSE (3) 2009: 139-145 - [c2]Zhendong Ma, Frank Kargl, Michael Weber:
Measuring location privacy in V2X communication systems with accumulated information. MASS 2009: 322-331 - [i1]Panagiotis Papadimitratos, Levente Buttyán, Tamás Holczer, Elmar Schoch, Julien Freudiger, Maxim Raya, Zhendong Ma, Frank Kargl, Antonio Kung, Jean-Pierre Hubaux:
Secure Vehicular Communication Systems: Design and Architecture. CoRR abs/0912.5391 (2009) - 2008
- [j1]Panagiotis Papadimitratos, Levente Buttyán, Tamás Holczer, Elmar Schoch, Julien Freudiger, Maxim Raya, Zhendong Ma, Frank Kargl, Antonio Kung, Jean-Pierre Hubaux:
Secure vehicular communication systems: design and architecture. IEEE Commun. Mag. 46(11): 100-109 (2008) - [c1]Zhendong Ma, Frank Kargl, Michael Weber:
Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications. VTC Fall 2008: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint