Giedre Sabaliauskaite

Orcid: 0000-0003-1183-7001

According to our database1, Giedre Sabaliauskaite authored at least 31 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
TOMSAC - Methodology for trade-off management between automotive safety and cyber security.
Comput. Secur., 2024

2023
Integrated Attack Tree in Residual Risk Management Framework.
Inf., 2023

Formal Template-Based Generation of Attack-Defence Trees for Automated Security Analysis.
Inf., 2023

2022
Framework for Calculating Residual Cybersecurity Risk of Threats to Road Vehicles in Alignment with ISO/SAE 21434.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
Requirements for a Cybersecurity Case Approach for the Assurance of Future Connected and Automated Vehicles.
Proceedings of the 7th International Conference on Vehicle Technology and Intelligent Transport Systems, 2021

2019
A review on safety failures, security attacks, and available countermeasures for autonomous vehicles.
Ad Hoc Networks, 2019

Collaborative Analysis Framework of Safety and Security for Autonomous Vehicles.
IEEE Access, 2019

A Template-Based Method for the Generation of Attack Trees.
Proceedings of the Information Security Theory and Practice, 2019

Designing Safe and Secure Mixed Traffic Systems.
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019

AVES - Automated Vehicle Safety and Security Analysis Framework.
Proceedings of the ACM Computer Science in Cars Symposium, 2019

2018
Cyber-security in robotics and autonomous systems.
Robotics Auton. Syst., 2018

Integrated Safety and Cybersecurity Risk Analysis of Cooperative Intelligent Transport Systems.
Proceedings of the 2018 Joint 10th International Conference on Soft Computing and Intelligent Systems (SCIS) and 19th International Symposium on Advanced Intelligent Systems (ISIS), 2018

Modelling Safe and Secure Cooperative Intelligent Transport Systems.
Proceedings of the Complex Systems Design & Management Asia, 2018

2017
A comprehensive approach, and a case study, for conducting attack detection experiments in Cyber-Physical Systems.
Robotics Auton. Syst., 2017

Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Integrating Six-Step Model with Information Flow Diagrams for Comprehensive Analysis of Cyber-Physical System Safety and Security.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

2016
Empirical Assessment of Methods to Detect Cyber Attacks on a Robot.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems.
Proceedings of the Critical Information Infrastructures Security, 2016

Empirical Assessment of Corrupt Sensor Data Detection Methods in a Robot.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Experimental Evaluation of Stealthy Attack Detection in a Robot.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

2014
Challenges and practices in aligning requirements with verification and validation: a case study of six companies.
Empir. Softw. Eng., 2014

Aligning Cyber-Physical System Safety and Security.
Proceedings of the Complex Systems Design & Management Asia, Designing Smart Cities: Proceedings of the First Asia, 2014

Countermeasures to Enhance Cyber-physical System Security and Safety.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Design of Intelligent Checkers to Enhance the Security and Safety of Cyber Physical Systems.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Intelligent Checkers to Improve Attack Detection in Cyber Physical Systems.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2010
Challenges in Aligning Requirements Engineering and Verification in a Large-Scale Industrial Context.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2010

2004
Assessing defect detection performance of interacting teams in object-oriented design inspection.
Inf. Softw. Technol., 2004

Comparing Reading Techniques for Object-Oriented Design Inspection.
IEICE Trans. Inf. Syst., 2004

Extended Metrics to Evaluate Cost Effectiveness of Software Inspections.
IEICE Trans. Inf. Syst., 2004

2003
Further investigations of reading techniques for object-oriented design inspection.
Inf. Softw. Technol., 2003

2002
An Experimental Comparison of Checklist-Based Reading and Perspective-Based Reading for UML Design Document Inspection.
Proceedings of the 2002 International Symposium on Empirical Software Engineering (ISESE 2002), 2002


  Loading...