default search action
Giedre Sabaliauskaite
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Giedre Sabaliauskaite, Jeremy W. Bryans, Hesamaldin Jadidbonab, Farhan Ahmad, Siraj A. Shaikh, Paul Wooderson:
TOMSAC - Methodology for trade-off management between automotive safety and cyber security. Comput. Secur. 140: 103798 (2024) - 2023
- [j11]Jeremy W. Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj Ahmed Shaikh:
Formal Template-Based Generation of Attack-Defence Trees for Automated Security Analysis. Inf. 14(9): 481 (2023) - [j10]Ahmed Nawaz Khan, Jeremy W. Bryans, Giedre Sabaliauskaite, Hesamaldin Jadidbonab:
Integrated Attack Tree in Residual Risk Management Framework. Inf. 14(12): 639 (2023) - [i2]Giedre Sabaliauskaite, Annabella Loconsole, Emelie Engström, Michael Unterkalmsteiner, Björn Regnell, Per Runeson, Tony Gorschek, Robert Feldt:
Challenges in aligning requirements engineering and verification in a large-scale industrial context. CoRR abs/2307.12419 (2023) - [i1]Elizabeth Bjarnason, Per Runeson, Markus Borg, Michael Unterkalmsteiner, Emelie Engström, Björn Regnell, Giedre Sabaliauskaite, Annabella Loconsole, Tony Gorschek, Robert Feldt:
Challenges and Practices in Aligning Requirements with Verification and Validation: A Case Study of Six Companies. CoRR abs/2307.12489 (2023) - 2022
- [c19]Ahmed Nawaz Khan, Jeremy W. Bryans, Giedre Sabaliauskaite:
Framework for Calculating Residual Cybersecurity Risk of Threats to Road Vehicles in Alignment with ISO/SAE 21434. ACNS Workshops 2022: 235-247 - 2021
- [c18]Luis-Pedro Cobos, Alastair R. Ruddle, Giedre Sabaliauskaite:
Requirements for a Cybersecurity Case Approach for the Assurance of Future Connected and Automated Vehicles. VEHITS 2021: 626-633
2010 – 2019
- 2019
- [j9]Jin Cui, Giedre Sabaliauskaite, Lin Shen Liew, Fengjun Zhou, Biao Zhang:
Collaborative Analysis Framework of Safety and Security for Autonomous Vehicles. IEEE Access 7: 148672-148683 (2019) - [j8]Jin Cui, Lin Shen Liew, Giedre Sabaliauskaite, Fengjun Zhou:
A review on safety failures, security attacks, and available countermeasures for autonomous vehicles. Ad Hoc Networks 90 (2019) - [c17]Giedre Sabaliauskaite, Lin Shen Liew, Fengjun Zhou:
AVES - Automated Vehicle Safety and Security Analysis Framework. CSCS 2019: 4:1-4:8 - [c16]Giedre Sabaliauskaite, Lin Shen Liew, Fengjun Zhou, Jin Cui:
Designing Safe and Secure Mixed Traffic Systems. HASE 2019: 222-227 - [c15]Jeremy W. Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj A. Shaikh, Fengjun Zhou:
A Template-Based Method for the Generation of Attack Trees. WISTP 2019: 155-165 - 2018
- [j7]Vicente Matellán, Tamara Bonaci, Giedre Sabaliauskaite:
Cyber-security in robotics and autonomous systems. Robotics Auton. Syst. 100: 41-42 (2018) - [c14]Giedre Sabaliauskaite, Jin Cui, Lin Shen Liew, Fengjun Zhou:
Modelling Safe and Secure Cooperative Intelligent Transport Systems. CSDM Asia 2018: 62-72 - [c13]Giedre Sabaliauskaite, Jin Cui, Lin Shen Liew, Fengjun Zhou:
Integrated Safety and Cybersecurity Risk Analysis of Cooperative Intelligent Transport Systems. SCIS&ISIS 2018: 723-728 - 2017
- [j6]Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya Mathur:
A comprehensive approach, and a case study, for conducting attack detection experiments in Cyber-Physical Systems. Robotics Auton. Syst. 98: 174-191 (2017) - [c12]Giedre Sabaliauskaite, Sridhar Adepu:
Integrating Six-Step Model with Information Flow Diagrams for Comprehensive Analysis of Cyber-Physical System Safety and Security. HASE 2017: 41-48 - [c11]Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya Mathur:
Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems. PRDC 2017: 235-244 - 2016
- [c10]Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya P. Mathur:
Empirical Assessment of Corrupt Sensor Data Detection Methods in a Robot. COMPSAC Workshops 2016: 482-489 - [c9]Giedre Sabaliauskaite, Sridhar Adepu, Aditya Mathur:
A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems. CRITIS 2016: 189-200 - [c8]Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya P. Mathur:
Empirical Assessment of Methods to Detect Cyber Attacks on a Robot. HASE 2016: 248-251 - 2015
- [c7]Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya P. Mathur:
Experimental Evaluation of Stealthy Attack Detection in a Robot. PRDC 2015: 70-79 - 2014
- [j5]Elizabeth Bjarnason, Per Runeson, Markus Borg, Michael Unterkalmsteiner, Emelie Engström, Björn Regnell, Giedre Sabaliauskaite, Annabella Loconsole, Tony Gorschek, Robert Feldt:
Challenges and practices in aligning requirements with verification and validation: a case study of six companies. Empir. Softw. Eng. 19(6): 1809-1855 (2014) - [c6]Giedre Sabaliauskaite, Aditya P. Mathur:
Design of Intelligent Checkers to Enhance the Security and Safety of Cyber Physical Systems. COMPSAC Workshops 2014: 7-12 - [c5]Giedre Sabaliauskaite, Aditya P. Mathur:
Countermeasures to Enhance Cyber-physical System Security and Safety. COMPSAC Workshops 2014: 13-18 - [c4]Giedre Sabaliauskaite, Aditya P. Mathur:
Aligning Cyber-Physical System Safety and Security. CSDM Asia 2014: 41-53 - 2013
- [c3]Giedre Sabaliauskaite, Aditya P. Mathur:
Intelligent Checkers to Improve Attack Detection in Cyber Physical Systems. CyberC 2013: 27-30 - 2010
- [c2]Giedre Sabaliauskaite, Annabella Loconsole, Emelie Engström, Michael Unterkalmsteiner, Björn Regnell, Per Runeson, Tony Gorschek, Robert Feldt:
Challenges in Aligning Requirements Engineering and Verification in a Large-Scale Industrial Context. REFSQ 2010: 128-142
2000 – 2009
- 2004
- [j4]Giedre Sabaliauskaite, Shinji Kusumoto, Katsuro Inoue:
Extended Metrics to Evaluate Cost Effectiveness of Software Inspections. IEICE Trans. Inf. Syst. 87-D(2): 475-480 (2004) - [j3]Giedre Sabaliauskaite, Shinji Kusumoto, Katsuro Inoue:
Comparing Reading Techniques for Object-Oriented Design Inspection. IEICE Trans. Inf. Syst. 87-D(4): 976-984 (2004) - [j2]Giedre Sabaliauskaite, Shinji Kusumoto, Katsuro Inoue:
Assessing defect detection performance of interacting teams in object-oriented design inspection. Inf. Softw. Technol. 46(13): 875-886 (2004) - 2003
- [j1]Giedre Sabaliauskaite, Fumikazu Matsukawa, Shinji Kusumoto, Katsuro Inoue:
Further investigations of reading techniques for object-oriented design inspection. Inf. Softw. Technol. 45(9): 571-585 (2003) - 2002
- [c1]Giedre Sabaliauskaite, Fumikazu Matsukawa, Shinji Kusumoto, Katsuro Inoue:
An Experimental Comparison of Checklist-Based Reading and Perspective-Based Reading for UML Design Document Inspection. ISESE 2002: 148-160
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint