default search action
Peter Würtz Vinther Tran-Jørgensen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j5]Tomas Kulik, Brijesh Dongol, Peter Gorm Larsen, Hugo Daniel Macedo, Steve Schneider, Peter W. V. Tran-Jørgensen, Jim Woodcock:
A Survey of Practical Formal Methods for Security. Formal Aspects Comput. 34(1): 1-39 (2022) - 2021
- [i1]Tomas Kulik, Brijesh Dongol, Peter Gorm Larsen, Hugo Daniel Macedo, Steve Schneider, Peter Würtz Vinther Tran-Jørgensen, Jim Woodcock:
A Survey of Practical Formal Methods for Security. CoRR abs/2109.01362 (2021) - 2020
- [j4]Luís Diogo Couto, Peter W. V. Tran-Jørgensen, René S. Nilsson, Peter Gorm Larsen:
Enabling continuous integration in a formal methods setting. Int. J. Softw. Tools Technol. Transf. 22(6): 667-683 (2020) - [c13]Tomas Kulik, Jalil Boudjadar, Peter W. V. Tran-Jørgensen:
Security Verification of Industrial Control Systems using Partial Model Checking. FormaliSE@ICSE 2020: 98-108
2010 – 2019
- 2019
- [j3]Miran Hasanagic, Tommaso Fabbri, Peter Gorm Larsen, Victor Bandur, Peter W. V. Tran-Jørgensen, Julien Ouy:
Code generation for distributed embedded systems with VDM-RT. Des. Autom. Embed. Syst. 23(3-4): 153-177 (2019) - [j2]Miran Hasanagic, Peter W. V. Tran-Jørgensen, René S. Nilsson, Peter Gorm Larsen:
Realization of distributed system models using code generation extensions. Softw. Pract. Exp. 49(3): 478-497 (2019) - [c12]Tomas Kulik, Peter W. V. Tran-Jørgensen, Jalil Boudjadar:
Compliance verification of a cyber security standard for Cloud-connected SCADA. GIoTS 2019: 1-6 - [c11]Peter W. V. Tran-Jørgensen, Tomas Kulik, Jalil Boudjadar, Peter Gorm Larsen:
Security analysis of cloud-connected industrial control systems using combinatorial testing. MEMOCODE 2019: 13:1-13:11 - 2018
- [j1]Peter W. V. Tran-Jørgensen, Peter Gorm Larsen, Gary T. Leavens:
Automated translation of VDM to JML-annotated Java. Int. J. Softw. Tools Technol. Transf. 20(2): 211-235 (2018) - [c10]Tomas Kulik, Peter W. V. Tran-Jørgensen, Jalil Boudjadar, Carl Schultz:
A Framework for Threat-Driven Cyber Security Verification of IoT Systems. ICST Workshops 2018: 89-97 - [c9]Tomas Kulik, Peter W. V. Tran-Jørgensen, Jalil Boudjadar:
Formal Security Analysis of Cloud-Connected Industrial Control Systems. SecITC 2018: 71-84 - 2016
- [c8]Miran Hasanagic, Peter W. V. Tran-Jørgensen, Kenneth Lausdahl, Peter Gorm Larsen:
Formalising and Validating the Interface Description in the FMI Standard. FM 2016: 344-351 - [c7]Luís Diogo Couto, Peter Würtz Vinther Tran-Jørgensen, Kenneth Lausdahl:
Principles for reuse in formal language tools. SAC 2016: 1997-2000 - [c6]Luís Diogo Couto, Peter W. V. Tran-Jørgensen, Gareth T. C. Edwards:
Model-Based Development of a Multi-algorithm Harvest Planning System. SIMULTECH (Selected Papers) 2016: 19-33 - [c5]Luís Diogo Couto, Peter W. V. Tran-Jørgensen, Gareth T. C. Edwards:
Combining Harvesting Operation Optimisations using Strategy-based Simulation. SIMULTECH 2016: 25-32 - 2015
- [c4]Luís Diogo Couto, Peter W. V. Tran-Jørgensen, Joey W. Coleman, Kenneth Lausdahl:
Migrating to an Extensible Architecture for Abstract Syntax Trees. WICSA 2015: 145-154 - [c3]Luís Diogo Couto, Peter Gorm Larsen, Miran Hasanagic, Georgios Kanakis, Kenneth Lausdahl, Peter W. V. Tran-Jørgensen:
Towards Enabling Overture as a Platform for Formal Notation IDEs. F-IDE 2015: 14-27 - 2014
- [c2]José Antonio Esparza Isasa, Peter Würtz Vinther Jørgensen, Claus Ballegård Nielsen, Stefan Hallerstede:
Modelling Energy Consumption in Embedded Systems with VDM-RT. ABZ 2014: 130-135 - [c1]José Antonio Esparza Isasa, Peter Würtz Vinther Jørgensen, Peter Gorm Larsen:
Hardware In the Loop for VDM-Real Time Modeling of Embedded Systems. MODELSWARD 2014: 209-216
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint