Developing Self-Managing Embedded Systems with ASSL. Proceedings of the IMCSIT 2009 - WRTP/RTS’09Proceedings of the IMCSIT 2009 - WRTP/RTS’09.
.
2009. Prototyping Self-Healing Behavior for NASA Swarm-based Systems with ASSL. TASK Quarterly (Journal of the Polish Academy of Science).
.
2021. SEcube(TM): an Open Security Platform - General Approach and Strategies. International Conference on Security and Management (SAM)International Conference on Security and Management (SAM).
.
2016. Threat modeling at run time: the case for reflective and adaptive threat management (NIER track). 2021 International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).
.
2021. SchröDinger's Security: Opening the Box on App Developers' Security Rationale. Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering.
.
2020. Privacy and Security Technologies for Smart City Development. Security and Privacy Applications for Smart City Development. :3–23.
.
2021. .
2020. Auction-based serious game for bug tracking. IET Software. 13:386-392.
.
2019. Examining Reward Mechanisms for Effective Usage of Application Lifecycle Management Tools. Systems, Software and Services Process Improvement: 24th European Conference, EuroSPI 2017, Ostrava, Czech Republic, September 6–8, 2017, ProceedingsSystems, Software and Services Process Improvement: 24th European Conference, EuroSPI 2017, Ostrava, Cze.
.
2017. Software Startups – A Research Agenda. e-Informatica Software Engineering Journal. 10
.
2016. .
2022. Tool Support for Automating Architectural Knowledge Extraction, the workshop on Sharing and Reusing architectural knowledge (SHARK). Collocated with ICSE 2009.
.
2009. CBCIoT: A Consensus Algorithm for Blockchain-Based IoT Applications. Applied Sciences. 11:11011.
.
2021. A Lattice-Theoretic Model for an Algebra of Communicating Sequential Processes. International Conference of Theoretical Aspects of Computing (ICTAC 2006)International Conference of Theoretical Aspects of Computing (ICTAC 2006).
.
2006. Do deepfake videos undermine our epistemic trust? A thematic analysis of tweets that discuss deepfakes in the Russian invasion of Ukraine PLOS ONE. 18:1-22.
.
2023. .
2022. The role of environmental assumptions in failures of DNA nano systems. Proceedings of Workshop on Complex Faults and Failures in Large Software Systems (COUFLESS 2015) co-located with ICSE 2015.
.
2015. Requirements and Specifications for Adaptive Security: Concepts and Analysis. Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems.
.
2018. OASIS: Weakening User Obligations for Security-critical Systems. 2020 IEEE 28th International Requirements Engineering Conference (RE).
.
2020. Specifying Software Features for Composition: A Tool-Supported Approach. Computer Networks. 57(12)
.
2013. Privacy Arguments: Analysing Selective Disclosure Requirements for Mobile Applications. 20th IEEE International Requirements Engineering Conference (RE).
.
2012. Digital Contact Tracing Apps for COVID-19: Development of a Citizen-Centered Evaluation Framework. JMIR Mhealth Uhealth. 10:e30691.
.
2022. On the Interplay Between Cyber and Physical Spaces for Adaptive Security. IEEE Transactions on Dependable and Secure Computing. PP
.
2018. Ariadne: Topology Aware Adaptive Security for Cyber-Physical Systems. 37th International Conference on Software Engineering (ICSE 2015)37th International Conference on Software Engineering (ICSE 2015).
.
2015. Autonomous and Autonomic Systems: With Applications to NASA Intelligent Spacecraft Operations and Exploration Systems. published in Chinese by National Defense Industry Presspublished in Chinese by National Defense Industry Press.
.
2012.