default search action
Abdelkader Magdy Shaaban
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Abdelkader Magdy Shaaban, Bernhard Klampfer, Martin Latzenhofer, Arndt Bonitz, Christoph Schmittner, Harald Kammerer:
Enhancing Tunnel Safety with Artery V2X Simulation for Real-Time Risk Assessment. SAFECOMP (Workshops) 2024: 88-100 - 2023
- [j2]Sebastian Chlup, Korbinian Christl, Christoph Schmittner, Abdelkader Magdy Shaaban, Stefan Schauer, Martin Latzenhofer:
THREATGET: Towards Automated Attack Tree Analysis for Automotive Cybersecurity. Inf. 14(1): 14 (2023) - [c17]Sandra König, Abdelkader Magdy Shaaban, Tamara Hadjina, Klemen Gregorc, Albert Kutej:
Identification and Evaluation of Cyber-Physical Threats on Interdependent Critical Infrastructures. ARES 2023: 111:1-111:5 - [c16]Svatopluk Stolfa, Jakub Stolfa, Marek Spanyik, Richard Messnarz, Damjan Ekert, Georg Macher, Michael Krisper, Christoph Schmittner, Abdelkader Magdy Shaaban, Alexander Much, Alen Salamun:
CYBERENG - Training Cybersecurity Engineer and Manager Skills in Automotive - Experience. EuroSPI (1) 2023: 366-383 - [c15]Miguel-Ángel Fas-Millán, Francesca Soro, Oliver Jung, Abdelkader Magdy Shaaban:
Cybersecurity Analysis in the UAV Domain: the Practical Approach of the Labyrinth Project. GoodIT 2023: 446-454 - [c14]Abdelkader Magdy Shaaban, Oliver Jung, Christoph Schmittner:
The Need for Threat Modelling in Unmanned Aerial Systems. SAFECOMP Workshops 2023: 73-84 - 2022
- [c13]Sandra König, Abdelkader Magdy Shaaban:
Parametrization of Probabilistic Risk Models. ARES 2022: 129:1-129:6 - [c12]Svatopluk Stolfa, Jakub Stolfa, Marek Spanyik, Jan Plucar, Richard Messnarz, Damjan Ekert, Georg Macher, Michael Krisper, Christoph Schmittner, Abdelkader Magdy Shaaban, Alexander Much, Alen Salamun:
Automotive Cybersecurity Manager and Engineer Skills Needs and Pilot Course Implementation. EuroSPI 2022: 335-348 - [c11]Christoph Schmittner, Abdelkader Magdy Shaaban, Georg Macher:
ThreatGet: Ensuring the Implementation of Defense-in-Depth Strategy for IIoT Based on IEC 62443. ICPS 2022: 1-6 - [c10]Abdelkader Magdy Shaaban, Sebastian Chlup, Christoph Schmittner:
UNECE Threat List Case Study: Prediction of Cyber Risks in the Automotive Domain Using Regression Analysis. SAFECOMP Workshops 2022: 110-122 - 2021
- [c9]Christoph Schmittner, Abdelkader Magdy Shaaban, Svatopluk Stolfa, Jakub Stolfa, Jan Plucar, Marek Spanyik, Alen Salamun, Richard Messnarz, Damjan Ekert, Georg Macher, Alexander Much:
Automotive Cybersecurity - Training the Future. EuroSPI 2021: 211-219 - [c8]Abdelkader Magdy Shaaban, Stefan Jaksic, Omar Veledar, Thomas Mauthner, Edin Arnautovic, Christoph Schmittner:
Rule-Based Threat Analysis and Mitigation for the Automotive Domain. SAFECOMP Workshops 2021: 24-38 - 2020
- [j1]Abdelkader Magdy Shaaban, Christoph Schmittner, Thomas Gruber, A. Baith Mohamed, Gerald Quirchmayr, Erich Schikuta:
An Automated Ontology-Based Security Requirements Identification for the Vehicular Domain. J. Data Intell. 1(4): 401-418 (2020)
2010 – 2019
- 2019
- [c7]Abdelkader Magdy Shaaban, Christoph Schmittner, Gerald Quirchmayr, A. Baith Mohamed, Thomas Gruber, Erich Schikuta:
Toward the Ontology-Based Security Verification and Validation Model for the Vehicular Domain. ICONIP (4) 2019: 521-529 - [c6]Abdelkader Magdy Shaaban, Christoph Schmittner, Thomas Gruber, A. Baith Mohamed, Gerald Quirchmayr, Erich Schikuta:
Ontology-Based Model for Automotive Security Verification and Validation. iiWAS 2019: 73-82 - [c5]Christoph Schmittner, Peter Tummeltshammer, David Hofbauer, Abdelkader Magdy Shaaban, Michael Meidlinger, Markus Tauber, Arndt Bonitz, Reinhard Hametner, Manuela Brandstetter:
Threat Modeling in the Railway Domain. RSSRail 2019: 261-271 - [c4]Abdelkader Magdy Shaaban, Thomas Gruber, Christoph Schmittner:
Ontology-based security tool for critical cyber-physical systems. SPLC (B) 2019: 91:1-91:4 - 2018
- [c3]Abdelkader Magdy Shaaban, Christoph Schmittner, Thomas Gruber, A. Baith Mohamed, Gerald Quirchmayr, Erich Schikuta:
CloudWoT - A Reference Model for Knowledge-based IoT Solutions. iiWAS 2018: 272-281 - [c2]Abdelkader Magdy Shaaban, Erwin Kristen, Christoph Schmittner:
Application of IEC 62443 for IoT Components. SAFECOMP Workshops 2018: 214-223 - 2017
- [c1]Zhendong Ma, Aleksandar Hudic, Abdelkader Magdy Shaaban, Sándor Plósz:
Security Viewpoint in a Reference Architecture Model for Cyber-Physical Production Systems. EuroS&P Workshops 2017: 153-159
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint