![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Peter Folkesson
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Mazen Mohamad, Ramana Reddy Avula, Peter Folkesson, Pierre Kleberger, Aria Mirzai, Martin Skoglund, Marvin Damschen:
Cybersecurity Pathways Towards CE-Certified Autonomous Forestry Machines. DSN-W 2024: 98-105 - [i1]Mazen Mohamad, Ramana Reddy Avula, Peter Folkesson, Pierre Kleberger, Aria Mirzai
, Martin Skoglund, Marvin Damschen
:
Cybersecurity Pathways Towards CE-Certified Autonomous Forestry Machines. CoRR abs/2404.19643 (2024) - 2023
- [c23]Mateen Malik, Maytheewat Aramrattana, Mehdi Maleki, Peter Folkesson, Behrooz Sangchoolie, Johan Karlsson:
Simulation-based Evaluation of a Remotely Operated Road Vehicle under Transmission Delays and Denial-of-Service Attacks. PRDC 2023: 23-29 - 2022
- [c22]Mateen Malik, Mehdi Maleki, Peter Folkesson, Behrooz Sangchoolie, Johan Karlsson:
ComFASE: A Tool for Evaluating the Effects of V2V Communication Faults and Attacks on Automated Vehicles. DSN 2022: 185-192 - [c21]Mehdi Maleki, Mateen Malik, Peter Folkesson, Behrooz Sangchoolie, Johan Karlsson:
Modeling and Evaluating the Effects of Jamming Attacks on Connected Automated Road Vehicles. PRDC 2022: 12-23 - [c20]Peter Folkesson, Behrooz Sangchoolie, Pierre Kleberger, Nasser Nowdehi:
On the Evaluation of Three Pre-Injection Analysis Techniques for Model-Implemented Fault- and Attack Injection. PRDC 2022: 130-140 - [c19]Enrico Ferrari
, Rupert Schlick
, Jose Luis de la Vara
, Peter Folkesson
, Behrooz Sangchoolie
:
Criteria for the Analysis of Gaps and Limitations of V&V Methods for Safety- and Security-Critical Systems. SAFECOMP Workshops 2022: 35-46 - 2020
- [c18]Raul Barbosa
, Stylianos Basagiannis
, Georgios Giantamidis, H. Becker, Enrico Ferrari
, J. Jahic, A. Kanak, Mikel Labayen Esnaola, Vanessa Orani, David Pereira, Luigi Pomante, Rupert Schlick, Ales Smrcka, Ahmet Yazici, Peter Folkesson, Behrooz Sangchoolie:
The VALU3S ECSEL Project: Verification and Validation of Automated Systems Safety and Security. DSD 2020: 352-359 - [c17]Behrooz Sangchoolie, Peter Folkesson, Pierre Kleberger
, Jonny Vinter
:
Analysis of Cybersecurity Mechanisms with respect to Dependability and Security Attributes. DSN Workshops 2020: 94-101
2010 – 2019
- 2019
- [c16]Lijun Shan, Behrooz Sangchoolie, Peter Folkesson, Jonny Vinter
, Erwin Schoitsch, Claire Loiseaux:
A Survey on the Application of Safety, Security, and Privacy Standards for Dependable Systems. EDCC 2019: 71-72 - [c15]Lijun Shan, Behrooz Sangchoolie, Peter Folkesson, Jonny Vinter
, Erwin Schoitsch, Claire Loiseaux:
A Survey on the Applicability of Safety, Security and Privacy Standards in Developing Dependable Systems. SAFECOMP Workshops 2019: 74-86 - 2018
- [c14]Behrooz Sangchoolie, Peter Folkesson, Jonny Vinter
:
A Study of the Interplay Between Safety and Security Using Model-Implemented Fault Injection. EDCC 2018: 41-48 - 2015
- [c13]Peter Folkesson, Fatemeh Ayatolahi, Behrooz Sangchoolie, Jonny Vinter
, Mafijul Md. Islam, Johan Karlsson:
Back-to-Back Fault Injection Testing in Model-Based Development. SAFECOMP 2015: 135-148
2000 – 2009
- 2005
- [c12]Joakim Aidemark, Peter Folkesson, Johan Karlsson:
A Framework for Node-Level Fault Tolerance in Distributed Real-Time Systems. DSN 2005: 656-665 - [c11]Jonny Vinter, Olof Hannius, Torbjörn Norlander, Peter Folkesson, Johan Karlsson:
Experimental Dependability Evaluation of a Fail-Bounded Jet Engine Control System for Unmanned Aerial Vehicles. DSN 2005: 666-671 - [c10]Raul Barbosa, Jonny Vinter, Peter Folkesson, Johan Karlsson:
Assembly-Level Pre-injection Analysis for Improving Fault Injection Efficiency. EDCC 2005: 246-262 - 2003
- [j2]Jean Arlat, Yves Crouzet, Johan Karlsson, Peter Folkesson, Emmerich Fuchs, Günther H. Leber:
Comparison of Physical and Software-Implemented Fault Injection Techniques. IEEE Trans. Computers 52(9): 1115-1133 (2003) - [c9]Jonny Vinter
, Andréas Johansson, Peter Folkesson, Johan Karlsson:
On the Design of Robust Integrators for Fail-Bounded Control Systems. DSN 2003: 415-424 - [c8]Joakim Aidemark, Jonny Vinter
, Peter Folkesson, Johan Karlsson:
GOOFI: Generic Object-Oriented Fault Injection Tool. DSN 2003: 668 - [c7]Joakim Aidemark, Peter Folkesson, Johan Karlsson:
On the Probability of Detecting Data Errors Generated by Permanent Faults Using Time Redundancy. IOLTS 2003: 68-74 - 2002
- [j1]Joakim Aidemark, Peter Folkesson, Johan Karlsson:
Path-Based Error Coverage Prediction. J. Electron. Test. 18(3): 343-349 (2002) - [c6]Joakim Aidemark, Jonny Vinter
, Peter Folkesson, Johan Karlsson:
Experimental Evaluation of Time-redundant Execution for a Brake-by-wire Application. DSN 2002: 210-218 - 2001
- [c5]Joakim Aidemark, Jonny Vinter
, Peter Folkesson, Johan Karlsson:
GOOFI: Generic Object-Oriented Fault Injection Tool. DSN 2001: 83-88 - [c4]Jonny Vinter
, Joakim Aidemark, Peter Folkesson, Johan Karlsson:
Reducing Critical Failures for Control Algorithms Using Executable Assertions and Best Effort Recover. DSN 2001: 347-356 - [c3]Joakim Aidemark, Peter Folkesson, Johan Karlsson:
Path-Based Error Coverage Prediction. IOLTW 2001: 14-20
1990 – 1999
- 1999
- [c2]Peter Folkesson, Johan Karlsson:
Considering Workload Input Variations in Error Coverage Estimation. EDCC 1999: 171-190 - 1998
- [c1]Peter Folkesson, Sven Svensson, Johan Karlsson:
A Comparison of Simulation Based and Scan Chain Implemented Fault Injection. FTCS 1998: 284-293
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint