default search action
Tomas Kulik
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i2]Jim Woodcock, Mikkel Schimdt Andersen, Diego F. Aranha, Stefan Hallerstede, Simon Thrane Hansen, Nikolaj Kuhne Jakobsen, Tomas Kulik, Peter Gorm Larsen, Hugo Daniel Macedo, Carlos Ignacio Isasa Martin, Victor Alexander Mtsimbe Norrild:
State of the Art Report: Verified Computation. CoRR abs/2308.15191 (2023) - 2022
- [j1]Tomas Kulik, Brijesh Dongol, Peter Gorm Larsen, Hugo Daniel Macedo, Steve Schneider, Peter W. V. Tran-Jørgensen, Jim Woodcock:
A Survey of Practical Formal Methods for Security. Formal Aspects Comput. 34(1): 1-39 (2022) - [c11]Jakub Hejc, Richard Redina, Tomas Kulik, Martin Pesl, Zdenek Starek:
Exercise-based Predictors of Late Recurrence of Atrial Fibrillation After Catheter Ablation. CinC 2022: 1-4 - [c10]Laurynas Ubys, Valeriu Nicolas Vancea, Tomas Kulik, Peter Gorm Larsen, Jalil Boudjadar, Diego F. Aranha:
Formal Model In-The-Loop for Secure Industrial Control Networks. FACS 2022: 74-89 - [c9]Tomas Kulik, Cláudio Gomes, Hugo Daniel Macedo, Stefan Hallerstede, Peter Gorm Larsen:
Towards Secure Digital Twins. ISoLA (4) 2022: 159-176 - 2021
- [c8]Martin Pesl, Jakub Hejc, Tomas Kulik, Tomás Vicar, Petra Novotna, Marina Ronzhina, Juraj Jakubik, Pavel Leinveber, Juan Pablo Gonzalez Rivas, Zdenek Starek:
Cardiac Arrhythmias Classification in Kardiovize Population Study. CinC 2021: 1-4 - [c7]Tomas Kulik, Jalil Boudjadar, Diego F. Aranha:
Formally Verified Credentials Management for Industrial Control Systems. FormaliSE@ICSE 2021: 75-85 - [i1]Tomas Kulik, Brijesh Dongol, Peter Gorm Larsen, Hugo Daniel Macedo, Steve Schneider, Peter Würtz Vinther Tran-Jørgensen, Jim Woodcock:
A Survey of Practical Formal Methods for Security. CoRR abs/2109.01362 (2021) - 2020
- [c6]Tomas Kulik, Jalil Boudjadar, Peter W. V. Tran-Jørgensen:
Security Verification of Industrial Control Systems using Partial Model Checking. FormaliSE@ICSE 2020: 98-108 - [c5]Tomas Kulik, Jalil Boudjadar, Diego F. Aranha:
Towards Formally Verified Key Management for Industrial Control Systems. FormaliSE@ICSE 2020: 119-129
2010 – 2019
- 2019
- [c4]Tomas Kulik, Peter W. V. Tran-Jørgensen, Jalil Boudjadar:
Compliance verification of a cyber security standard for Cloud-connected SCADA. GIoTS 2019: 1-6 - [c3]Peter W. V. Tran-Jørgensen, Tomas Kulik, Jalil Boudjadar, Peter Gorm Larsen:
Security analysis of cloud-connected industrial control systems using combinatorial testing. MEMOCODE 2019: 13:1-13:11 - 2018
- [c2]Tomas Kulik, Peter W. V. Tran-Jørgensen, Jalil Boudjadar, Carl Schultz:
A Framework for Threat-Driven Cyber Security Verification of IoT Systems. ICST Workshops 2018: 89-97 - [c1]Tomas Kulik, Peter W. V. Tran-Jørgensen, Jalil Boudjadar:
Formal Security Analysis of Cloud-Connected Industrial Control Systems. SecITC 2018: 71-84
Coauthor Index
aka: Peter W. V. Tran-Jørgensen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint