Volgen
Abdelkader Magdy Shaaban
Abdelkader Magdy Shaaban
Geverifieerd e-mailadres voor ait.ac.at - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Security viewpoint in a reference architecture model for cyber-physical production systems
Z Ma, A Hudic, A Shaaban, S Plosz
2017 IEEE European symposium on security and privacy workshops (EuroS&PW …, 2017
502017
Ontology-based security tool for critical cyber-physical systems
AM Shaaban, T Gruber, C Schmittner
Proceedings of the 23rd International Systems and Software Product Line …, 2019
242019
Application of IEC 62443 for IoT components
AM Shaaban, E Kristen, C Schmittner
Computer Safety, Reliability, and Security: SAFECOMP 2018 Workshops, ASSURE …, 2018
212018
Ontology-based model for automotive security verification and validation
AM Shaaban, C Schmittner, T Gruber, AB Mohamed, G Quirchmayr, ...
Proceedings of the 21st International Conference on Information Integration …, 2019
182019
CloudWoT-a reference model for knowledge-based IoT solutions
AM Shaaban, C Schmittner, T Gruber, AB Mohamed, G Quirchmayr, ...
Proceedings of the 20th International Conference on Information Integration …, 2018
182018
Threat modeling in the railway domain
C Schmittner, P Tummeltshammer, D Hofbauer, AM Shaaban, ...
Reliability, Safety, and Security of Railway Systems. Modelling, Analysis …, 2019
172019
Towards optimized security attributes for IoT devices in smart agriculture based on the IEC 62443 security standard
AM Shaaban, S Chlup, N El-Araby, C Schmittner
Applied Sciences 12 (11), 5653, 2022
112022
Risk management and standard compliance for cyber-physical systems of systems
G Matta, S Chlup, AM Shaaban, C Schmittner, A Pinzenöhler, E Szalai, ...
Infocommunications Journal 13 (2), 32-39, 2021
112021
THREATGET: towards automated attack tree analysis for automotive cybersecurity
S Chlup, K Christl, C Schmittner, AM Shaaban, S Schauer, M Latzenhofer
Information 14 (1), 14, 2022
82022
ThreatGet: ensuring the implementation of defense-in-depth strategy for IIoT based on IEC 62443
C Schmittner, AM Shaaban, G Macher
2022 IEEE 5th International Conference on Industrial Cyber-Physical Systems …, 2022
72022
A Proposal for a Comprehensive Automotive Cybersecurity Reference Architecture
MH Christoph Schmittner, Martin Latzenhofer, Shaaban Abdelkader Magdy
The Seventh International Conference on Advances in Vehicular Systems …, 2018
7*2018
Toward applying the iec 62443 in the uas for secure civil applications
AM Shaaban, O Jung, MA Fas Millan
Data Science–Analytics and Applications: Proceedings of the 4th …, 2022
62022
Automotive cybersecurity-training the future
C Schmittner, A Shaaban, S Stolfa, J Stolfa, J Plucar, M Spanyik, ...
Systems, Software and Services Process Improvement: 28th European Conference …, 2021
62021
A framework for ontology based management of neural network as a service
E Schikuta, A Magdy, AB Mohamed
Neural Information Processing: 23rd International Conference, ICONIP 2016 …, 2016
62016
Analysis of DNA signal representation applying dynamic time warping (DTW) and derivative dynamic time warping (DDTW)
AK Magdy, A Khadragi, M Saeb, AB Mohamed
The International Journal of Computer Science and Communications Security …, 2013
62013
Parametrization of Probabilistic Risk Models
S König, AM Shaaban
Proceedings of the 17th International Conference on Availability …, 2022
52022
THREATGET: NEW APPROACH TOWARDS AUTOMOTIVE SECURITY-BY-DESIGN
CS Abdelkader Magdy Shaaban
IDIMT-2020 Innovation and Transformation in a Digital World 28th …, 2020
4*2020
Automotive cybersecurity manager and engineer skills needs and pilot course implementation
S Stolfa, J Stolfa, M Spanyik, J Plucar, R Messnarz, D Ekert, G Macher, ...
European Conference on Software Process Improvement, 335-348, 2022
32022
An ontology-based cybersecurity framework for the automotive domain : design, implementation, and evaluation
A Shaaban
University of Vienna, 2021
32021
An Automated Ontology-Based Security Requirements Identification for the Vehicular Domain.
AM Shaaban, C Schmittner, T Gruber, AB Mohamed, G Quirchmayr, ...
J. Data Intell. 1 (4), 401-418, 2020
32020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20