default search action
Aida Causevic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c36]Björn Leander, Aida Causevic, Hans Hansson, Tomas Lindström:
Evaluation of an OPC UA-Based Access Control Enforcement Architecture. ESORICS Workshops (1) 2023: 124-144 - [c35]Björn Leander, Aida Causevic, Tomas Lindström, Hans Hansson:
Access Control Enforcement Architectures for Dynamic Manufacturing Systems. ICSA 2023: 82-92 - [c34]Selma Opacin, Lejla Rizvanovic, Björn Leander, Saad Mubeen, Aida Causevic:
Developing and Evaluating MQTT Connectivity for an Industrial Controller. MECO 2023: 1-5 - 2022
- [j3]Mirgita Frasheri, Václav Struhár, Alessandro Vittorio Papadopoulos, Aida Causevic:
Ethics of Autonomous Collective Decision-Making: The Caesar Framework. Sci. Eng. Ethics 28(6): 61 (2022) - [c33]Björn Leander, Tijana Markovic, Aida Causevic, Tomas Lindström, Hans Hansson, Sasikumar Punnekkat:
Simulation Environment for Modular Automation Systems. IECON 2022: 1-6 - 2021
- [j2]Björn Leander, Aida Causevic, Hans Hansson, Tomas Lindström:
Toward an Ideal Access Control Strategy for Industry 4.0 Manufacturing Systems. IEEE Access 9: 114037-114050 (2021) - [c32]Björn Leander, Aida Causevic, Tomas Lindström, Hans Hansson:
A Questionnaire Study on the Use of Access Control in Industrial Systems. ETFA 2021: 1-8 - [c31]Jamal El Hachem, Elena Lisova, Aida Causevic:
Securing system-of-systems through a game theory approach. SAC 2021: 1443-1446 - 2020
- [c30]Björn Leander, Aida Causevic, Hans Hansson, Tomas Lindström:
Access Control for Smart Manufacturing Systems. ECSA Companion 2020: 463-476 - [c29]Fereidoun Moradi, Sara Abbaspour Asadollah, Ali Sedaghatbaf, Aida Causevic, Marjan Sirjani, Carolyn L. Talcott:
An Actor-Based Approach for Security Analysis of Cyber-Physical Systems. FMICS 2020: 130-147 - [c28]Predrag Filipovikj, Aida Causevic, Elena Lisova:
Service Realizability Check as a Technique to Support a Service Security Assurance Case. ICIT 2020: 973-980 - [c27]Ajna Hodzic, Dzenita Skulj, Aida Causevic:
Data-driven Anomaly Detection for Railway Propulsion Control Systems. IECON 2020: 4351-4356
2010 – 2019
- 2019
- [j1]Elena Lisova, Irfan Sljivo, Aida Causevic:
Safety and Security Co-Analyses: A Systematic Literature Review. IEEE Syst. J. 13(3): 2189-2200 (2019) - [c26]Björn Leander, Aida Causevic, Hans Hansson:
Applicability of the IEC 62443 standard in Industry 4.0 / IIoT. ARES 2019: 101:1-101:8 - [c25]Jamal El Hachem, Ali Sedaghatbaf, Elena Lisova, Aida Causevic:
Using Bayesian Networks for a Cyberattacks Propagation Analysis in Systems-of-Systems. APSEC 2019: 363-370 - [c24]Aida Causevic, Elena Lisova, Mohammad Ashjaei, Syed Usman Ashgar:
On Incorporating Security Parameters in Service Level Agreements. CLOSER 2019: 48-57 - [c23]Aida Causevic, Alessandro Vittorio Papadopoulos, Marjan Sirjani:
Towards a Framework for Safe and Secure Adaptive Collaborative Systems. COMPSAC (2) 2019: 165-170 - [c22]Elena Lisova, Irfan Sljivo, Aida Causevic:
Safety and Security Co-Analyses: A Systematic Literature Review. COMPSAC (1) 2019: 833 - [c21]Björn Leander, Aida Causevic, Hans Hansson:
Cybersecurity Challenges in Large Industrial IoT Systems. ETFA 2019: 1035-1042 - [c20]Bjarne Johansson, Björn Leander, Aida Causevic, Alessandro Vittorio Papadopoulos, Thomas Nolte:
Classification of PROFINET I/O Configurations utilizing Neural Networks. ETFA 2019: 1321-1324 - [c19]Fereidoun Moradi, Ali Sedaghatbaf, Sara Abbaspour Asadollah, Aida Causevic, Marjan Sirjani:
On-Off Attack on a Blockchain-based IoT System. ETFA 2019: 1768-1773 - [c18]Elena Lisova, Jamal El Hachem, Aida Causevic:
Investigating Attack Propagation in a SoS via a Service Decomposition. SERVICES 2019: 9-14 - 2018
- [c17]Elena Lisova, Aida Causevic, Kaj Hänninen, Henrik Thane, Hans Hansson:
A Systematic Way to Incorporate Security in Safety Analysis. DSN Workshops 2018: 166-171 - [c16]Elena Lisova, Aida Causevic:
Towards Security Case Run-Time Adaptation by System Decomposition into Services. IECON 2018: 4102-4108 - [c15]Amer Surkovic, Dzana Hanic, Elena Lisova, Aida Causevic, Kristina Lundqvist, David Wenslandt, Carl Falk:
Incorporating Attacks Modeling into Safety Process. SAFECOMP Workshops 2018: 31-41 - [c14]Amer Surkovic, Dzana Hanic, Elena Lisova, Aida Causevic, David Wenslandt, Carl Falk:
Towards Attack Models in Autonomous Systems of Systems. SoSE 2018: 583-585 - 2017
- [c13]Aida Causevic:
A risk and threat assessment approaches overview in autonomous systems of systems. ICAT 2017: 1-6 - [c12]Elena Lisova, Aida Causevic, Elisabeth Uhlemann, Mats Björkman:
Clock synchronization considerations in security informed safety assurance of autonomous systems of systems. IECON 2017: 8385-8390 - 2016
- [c11]Hossein Fotouhi, Aida Causevic, Kristina Lundqvist, Mats Björkman:
Communication and Security in Health Monitoring Systems - A Review. COMPSAC 2016: 545-554 - [c10]Hossein Fotouhi, Aida Causevic, Maryam Vahabi, Mats Björkman:
Interoperability in heterogeneous Low-Power Wireless Networks for Health Monitoring Systems. ICC Workshops 2016: 393-398 - 2015
- [c9]Mobyen Uddin Ahmed, Mats Björkman, Aida Causevic, Hossein Fotouhi, Maria Lindén:
An Overview on the Internet of Things for Health Monitoring Systems. IoT 360 (1) 2015: 429-436 - 2014
- [b1]Aida Causevic:
Formal Approaches for Behavioral Modeling and Analysis of Design-time Services and Service Negotiations. Mälardalen University, Sweden, 2014 - [c8]Aida Causevic, Cristina Cerschi Seceleanu, Paul Pettersson:
Distributed Energy Management Case Study: A Formal Approach to Analyzing Utility Functions. ISoLA (2) 2014: 74-87 - 2013
- [c7]Aida Causevic, Cristina Cerschi Seceleanu, Paul Pettersson:
An Analyzable Model of Automated Service Negotiation. SOSE 2013: 125-136 - 2012
- [c6]Aida Causevic, Cristina Cerschi Seceleanu, Paul Pettersson:
Checking Correctness of Services Modeled as Priced Timed Automata. ISoLA (2) 2012: 308-322 - [c5]Eduard Paul Enoiu, Raluca Marinescu, Aida Causevic, Cristina Cerschi Seceleanu:
A Design Tool for Service-oriented Systems. FESCA 2012: 95-100 - 2010
- [c4]Aida Causevic, Cristina Cerschi Seceleanu, Paul Pettersson:
Modeling and Reasoning about Service Behaviors and Their Compositions. ISoLA (2) 2010: 82-96
2000 – 2009
- 2009
- [c3]Aida Causevic, Aneta Vulgarakis:
Towards a Unified Behavioral Model for Component-Based and Service-Oriented Systems. COMPSAC (2) 2009: 497-503 - [c2]Aneta Vulgarakis, Aida Causevic:
Applying REMES behavioral modeling to PLC systems. ICAT 2009: 1-8 - 2008
- [c1]Aida Causevic, Paul Pettersson, Cristina Cerschi Seceleanu:
Analyzing Resource-Usage Impact on Component-Based Systems Performance and Reliability. CIMCA/IAWTIC/ISE 2008: 302-308
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint