Giedre Sabaliauskaite
Orcid: 0000-0003-1183-7001
According to our database1,
Giedre Sabaliauskaite
authored at least 31 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
TOMSAC - Methodology for trade-off management between automotive safety and cyber security.
Comput. Secur., 2024
2023
Formal Template-Based Generation of Attack-Defence Trees for Automated Security Analysis.
Inf., 2023
2022
Framework for Calculating Residual Cybersecurity Risk of Threats to Road Vehicles in Alignment with ISO/SAE 21434.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
Requirements for a Cybersecurity Case Approach for the Assurance of Future Connected and Automated Vehicles.
Proceedings of the 7th International Conference on Vehicle Technology and Intelligent Transport Systems, 2021
2019
A review on safety failures, security attacks, and available countermeasures for autonomous vehicles.
Ad Hoc Networks, 2019
IEEE Access, 2019
Proceedings of the Information Security Theory and Practice, 2019
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019
Proceedings of the ACM Computer Science in Cars Symposium, 2019
2018
Integrated Safety and Cybersecurity Risk Analysis of Cooperative Intelligent Transport Systems.
Proceedings of the 2018 Joint 10th International Conference on Soft Computing and Intelligent Systems (SCIS) and 19th International Symposium on Advanced Intelligent Systems (ISIS), 2018
Proceedings of the Complex Systems Design & Management Asia, 2018
2017
A comprehensive approach, and a case study, for conducting attack detection experiments in Cyber-Physical Systems.
Robotics Auton. Syst., 2017
Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
Integrating Six-Step Model with Information Flow Diagrams for Comprehensive Analysis of Cyber-Physical System Safety and Security.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
2016
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
Proceedings of the Critical Information Infrastructures Security, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015
2014
Challenges and practices in aligning requirements with verification and validation: a case study of six companies.
Empir. Softw. Eng., 2014
Proceedings of the Complex Systems Design & Management Asia, Designing Smart Cities: Proceedings of the First Asia, 2014
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
Design of Intelligent Checkers to Enhance the Security and Safety of Cyber Physical Systems.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
2013
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013
2010
Challenges in Aligning Requirements Engineering and Verification in a Large-Scale Industrial Context.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2010
2004
Assessing defect detection performance of interacting teams in object-oriented design inspection.
Inf. Softw. Technol., 2004
IEICE Trans. Inf. Syst., 2004
IEICE Trans. Inf. Syst., 2004
2003
Inf. Softw. Technol., 2003
2002
An Experimental Comparison of Checklist-Based Reading and Perspective-Based Reading for UML Design Document Inspection.
Proceedings of the 2002 International Symposium on Empirical Software Engineering (ISESE 2002), 2002