Jeremy W. Bryans
Orcid: 0000-0001-9850-8467
According to our database1,
Jeremy W. Bryans
authored at least 60 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
Veh. Commun., 2024
TOMSAC - Methodology for trade-off management between automotive safety and cyber security.
Comput. Secur., 2024
2023
A comparative analysis of multi-criteria decision methods for secure beacon selection in vehicular platoons.
Trans. Emerg. Telecommun. Technol., November, 2023
J. Log. Algebraic Methods Program., 2023
Formal Template-Based Generation of Attack-Defence Trees for Automated Security Analysis.
Inf., 2023
2022
Framework for Calculating Residual Cybersecurity Risk of Threats to Road Vehicles in Alignment with ISO/SAE 21434.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
Comput. Electr. Eng., 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
2020
Future Gener. Comput. Syst., 2020
2019
Proceedings of the Information Security Theory and Practice, 2019
Proceedings of the 19th IEEE International Conference on Software Quality, 2019
A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019
Communication in Emergency Management through Data Integration and Trust: an introduction to the CEM-DIT system.
Proceedings of the 16th International Conference on Information Systems for Crisis Response and Management, 2019
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2019
2018
Building an automotive security assurance case using systematic security evaluations.
Comput. Secur., 2018
Informing decision makers: facilitating communication and trust for decision makers during crises.
Proceedings of the 15th International Conference on Information Systems for Crisis Response and Management, 2018
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018
Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
2017
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications.
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017
Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017
2016
Proceedings of the Information Security Theory and Practice, 2016
2015
IEEE Syst. J., 2015
Future Gener. Comput. Syst., 2015
2014
Proceedings of the 9th International Conference on System of Systems Engineering, 2014
Leadership Election: An Industrial SoS Application of Compositional Deadlock Verification.
Proceedings of the NASA Formal Methods - 6th International Symposium, NFM 2014, Houston, TX, USA, April 29, 2014
Proceedings of the Provenance and Annotation of Data and Processes, 2014
Proceedings of the Collaborative Systems for Smart Networked Environments, 2014
Proceedings of the Perspectives of System Informatics, 2014
2013
Proceedings of the IEEE International Systems Conference, 2013
2012
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012
Proceedings of the 7th International Conference on System of Systems Engineering, 2012
Proceedings of the Collaborative Networks in the Internet of Services, 2012
2011
Refinement-Based Techniques in the Analysis of Information Flow Policies for Dynamic Virtual Organisations.
Proceedings of the Adaptation and Value Creating Collaborative Networks, 2011
Proceedings of the Formal Methods and Software Engineering, 2011
2010
Proceedings of the 15th IEEE International Conference on Engineering of Complex Computer Systems, 2010
Proceedings of the Formal Methods for Industrial Critical Systems, 2010
2009
Formal Modelling and Analysis of Business Information Applications with Fault Tolerant Middleware.
Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems, 2009
2008
2007
Proceedings of the Formal Methods and Software Engineering, 2007
2006
Proceedings of the Leveraging Applications of Formal Methods, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005
2004
Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, 2004
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004
Proceedings of the Algebraic Methodology and Software Technology, 2004
2003
2001
Implementing a Modal Logic over Data and Processes using XTL.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2001
2000
Proceedings of the Integrated Formal Methods, Second International Conference, 2000
1999
Proceedings of the 3rd Irish Workshop on Formal Methods, Galway, Ireland, July 1999, 1999
1996
1995
Real-time LOTOS and Timed Observations.
Proceedings of the Formal Description Techniques VIII, 1995
Proceedings of the CONCUR '95: Concurrency Theory, 1995