Jason Jaskolka

Orcid: 0000-0001-6316-3040

According to our database1, Jason Jaskolka authored at least 56 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Requirements for Applying SCIA: A Structured Cyberattack Impact Analysis Approach for ICS.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024

Interplay of Human Factors and Secure Architecture Design using Model-Driven Engineering.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2024

2023
Integrating Medical and Wearable Devices with E-Health Systems Using Horizontal IoT Platforms.
Proceedings of the IEEE Sensors Applications Symposium, 2023

Constructing Security Cases Based on Formal Verification of Security Requirements in Alloy.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops, 2023

Understanding the Role of Human-Related Factors in Security Requirements Elicitation.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2023

Eliciting a Security Architecture Requirements Baseline from Standards and Regulations.
Proceedings of the 31st IEEE International Requirements Engineering Conference, RE 2023, 2023

A Security Compliance-by-Design Framework Utilizing Reusable Formal Models.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

A Formal Metamodel for Software Architectures with Composite Components.
Proceedings of the Model and Data Engineering - 12th International Conference, 2023

Formalizing the Relationship between Security Policies and Objectives in Software Architectures.
Proceedings of the 20th International Conference on Software Architecture, 2023

Specification and Verification of Communication Paradigms for CBSE in Event B.
Proceedings of the 27th International Conference on Engineering of Complex Computer Systems, 2023

Hardening Systems Against Data Corruption Attacks at Design Time.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Formal model-based argument patterns for security cases.
Proceedings of the 28th European Conference on Pattern Languages of Programs, 2023

Single and Combined Cyberattack Impact on Industrial Wastewater Systems.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023

2022
Software Design Trends Supporting Multiconcern Assurance.
IEEE Softw., 2022

Architecture for ontology-supported multi-context reasoning systems.
Data Knowl. Eng., 2022

Open Source Horizontal IoT Platforms: A Comparative Study on Functional Requirements.
CoRR, 2022

A Threat Model and Security Recommendations for IoT Sensors in Connected Vehicle Networks.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

Towards logical specification of adversarial examples in machine learning.
Proceedings of the IEEE International Conference on Trust, 2022

Conceptualizing the Secure Machine Learning Operations (SecMLOps) Paradigm.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

On the effectiveness of data balancing techniques in the context of ML-based test case prioritization.
Proceedings of the 18th International Conference on Predictive Models and Data Analytics in Software Engineering, 2022

Towards the Integration of Human Factors in Collaborative Decision Making for Secure Architecture Design.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

A Formal Analysis of the Efficacy of Rebooting as a Countermeasure Against IoT Botnets.
Proceedings of the IEEE International Conference on Communications, 2022

Defense Models for Data Recovery in Industrial Control Systems.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

Security Patterns for Machine Learning: The Data-Oriented Stages.
Proceedings of the 27th European Conference on Pattern Languages of Programs, 2022

An Evaluation of IoT Security Guidance Documents: A Shared Responsibility Perspective.
Proceedings of the 13th International Conference on Ambient Systems, 2022

2021
Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support.
J. Syst. Archit., 2021

Analyzing Structural Security Posture to Evaluate System Design Decisions.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Analyzing the Impact of Cyberattacks on Industrial Control Systems using Timed Automata.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

A Security Property Decomposition Argument Pattern for Structured Assurance Case Models.
Proceedings of the EuroPLoP'21: European Conference on Pattern Languages of Programs 2021, Graz, Austria, July 7, 2021

Modeling and Simulation Approaches for Cybersecurity Impact Analysis: State-of-the-Art.
Proceedings of the Annual Modeling and Simulation Conference, 2021

2020
Formal specification and verification of reusable communication models for distributed systems architecture.
Future Gener. Comput. Syst., 2020

Evaluating the Exploitability of Implicit Interactions in Distributed Systems.
CoRR, 2020

Evaluating the Soundness of Security Metrics from Vulnerability Scoring Frameworks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Evaluation of Statistical Tests for Detecting Storage-Based Covert Channels.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Recommendations for Effective Security Assurance of Software-Dependent Systems.
Proceedings of the Intelligent Computing, 2020

Reusable Formal Models for Threat Specification, Detection, and Treatment.
Proceedings of the Reuse in Emerging Software Engineering Practices, 2020

Identifying and Analyzing Implicit Interactions in a Wastewater Dechlorination System.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

2019
Communicating Concurrent Kleene Algebra for Distributed Systems Specification.
Arch. Formal Proofs, 2019

Distributed Maintenance of a Spanning Tree of k-Connected Graphs.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

2018
Formalizing Reusable Communication Models for Distributed Systems Architecture.
Proceedings of the Model and Data Engineering - 8th International Conference, 2018

2017
An Approach for Identifying and Analyzing Implicit Interactions in Distributed Systems.
IEEE Trans. Reliab., 2017

Identifying Implicit Component Interactions in Distributed Cyber-Physical Systems.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Mitigating covert channels based on analysis of the potential for communication.
Theor. Comput. Sci., 2016

2015
Investigative support for information confidentiality.
J. Ambient Intell. Humaniz. Comput., 2015

Towards the Certification of Covert Channel Freeness in Cloud-based Systems.
Proceedings of the 6th International Conference on Ambient Systems, 2015

2014
An aspect-oriented language for feature-modeling.
J. Ambient Intell. Humaniz. Comput., 2014

A Formulation of the Potential for Communication Condition using C2KA.
Proceedings of the Proceedings Fifth International Symposium on Games, 2014

Investigative Support for Information Confidentiality Part I: Detecting Confidential Information Leakage via Protocol-based Covert Channels.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Investigative Support for Information Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Endowing Concurrent Kleene Algebra with Communication Actions.
Proceedings of the Relational and Algebraic Methods in Computer Science, 2014

2012
An Aspect-Oriented Language for Product Family Specification.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

On the Necessary Conditions for Covert Channel Existence: A State-of-the-Art Survey.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Verification of Aspectual Composition in Feature-Modeling.
Proceedings of the Software Engineering and Formal Methods - 10th International Conference, 2012

2011
Exploring Covert Channels.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

A formal test for detecting information leakage via covert channels.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2009
Verification of Information Flow in Agent-Based Systems.
Proceedings of the E-Technologies: Innovation in an Open World, 2009


  Loading...