Zhendong Ma

According to our database1, Zhendong Ma authored at least 49 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
BPMS Blockchain Technology Soft Integration For Non-tamperable Logging.
Proceedings of the Business Process Management: Blockchain, Robotic Process Automation, Central and Eastern European, Educators and Industry Forum, 2024

2022
Apples and Cars: a Comparison of Security.
CoRR, 2022

2020
Combined automotive safety and security pattern engineering approach.
Reliab. Eng. Syst. Saf., 2020

2019
Finite element analysis for engine crankshaft torsional stiffness.
Int. J. Simul. Process. Model., 2019

Practical Security and Privacy Threat Analysis in the Automotive Domain: Long Term Support Scenario for Over-the-Air Updates.
Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems, 2019

Approaching the Automation of Cyber Security Testing of Connected Vehicles.
Proceedings of the Third Central European Cybersecurity Conference, 2019

2018
Smart Farming: From Automated Machinery to the Cloud.
ERCIM News, 2018

Status of the Development of ISO/SAE 21434.
Proceedings of the Systems, Software and Services Process Improvement, 2018

2017
Safety and Security Co-engineering of Connected, Intelligent, and Automated Vehicles.
ERCIM News, 2017

Interdisciplinarity in practice: Challenges and benefits for privacy research.
Comput. Law Secur. Rev., 2017

Safety and Security Co-engineering and Argumentation Framework.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Security and Privacy in the Automotive Domain: A Technical and Social Analysis.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Systematic Pattern Approach for Safety and Security Co-engineering in the Automotive Domain.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Characterizing Regulatory Documents and Guidelines Based on Text Mining.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2017 Conferences, 2017

Security Viewpoint in a Reference Architecture Model for Cyber-Physical Production Systems.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

Practical safe, secure and reliable machine-to-machine connectivity for cyber-physical-production systems.
Proceedings of the 22nd IEEE International Conference on Emerging Technologies and Factory Automation, 2017

Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Towards a Secure SCRUM Process for Agile Web Application Development.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Using SAE J3061 for Automotive Security Requirement Engineering.
Proceedings of the Computer Safety, Reliability, and Security, 2016

Limitation and Improvement of STPA-Sec for Safety and Security Co-analysis.
Proceedings of the Computer Safety, Reliability, and Security, 2016

2015
Combining Safety and Security Engineering for Trustworthy Cyber-Physical Systems.
ERCIM News, 2015

A Cross-Layer Security Analysis for Process-Aware Information Systems.
CoRR, 2015

Towards a Framework for Alignment Between Automotive Safety and Security Standards.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Embedded systems security: Threats, vulnerabilities, and attack taxonomy.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Building a Privacy Accountable Surveillance System.
Proceedings of the MODELSWARD 2015, 2015

Combined safety and security development lifecylce.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

Using Content Analysis for Privacy Requirement Extraction and Policy Formalization.
Proceedings of the Enterprise Modelling and Information Systems Architectures, 2015

A Case Study of FMVEA and CHASSIS as Safety and Security Co-Analysis Method for Automotive Cyber-physical Systems.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
Genie in a Model? Why Model Driven Security will not secure your Web Application.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

FMVEA for Safety and Security Analysis of Intelligent and Cooperative Vehicles.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Using Model Driven Security Approaches in Web Application Development.
Proceedings of the Information and Communication Technology, 2014

PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems.
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

Standardization challenges for safety and security of connected, automated and intelligent vehicles.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Towards a Multidisciplinary Framework to Include Privacy in the Design of Video Surveillance Systems.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

2013
Modellgetriebene Entwicklung sicherer Softwaresysteme für das österreichische E-Government.
Elektrotech. Informationstechnik, 2013

Determining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2013

Privacy-Preserving Social Network for an Untrusted Server.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

2012
Towards a Layered Architectural View for Security Analysis in SCADA Systems
CoRR, 2012

Designing a Cyber Attack Information System for National Situational Awareness.
Proceedings of the Future Security - 7th Security Research Conference, 2012

Attack Vectors to Metering Data in Smart Grids under Security Constraints.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Location privacy in vehicular communication systems: a measurement approach.
PhD thesis, 2011

Enhance Data Privacy in Service Compositions through a Privacy Proxy.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Measuring long-term location privacy in vehicular communication systems.
Comput. Commun., 2010

V-Tokens for Conditional Pseudonymity in VANETs.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

2009
Measuring location privacy in V2X communication systems with accumulated information.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Privacy Requirements in Vehicular Communication Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Secure vehicular communication systems: design and architecture.
IEEE Commun. Mag., 2008

Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008


  Loading...