Cited By
View all- Petho ZKhan ITorok Á(2022)Analysis of Security Vulnerability Levels of In-Vehicle Network Topologies Applying Graph RepresentationsJournal of Electronic Testing10.1007/s10836-021-05973-xOnline publication date: 10-Jan-2022
- Kugele SObergfell PSax E(2021)Model-based resource analysis and synthesis of service-oriented automotive software architecturesSoftware and Systems Modeling10.1007/s10270-021-00896-9Online publication date: 5-Sep-2021
- Schwarzer TFalk JMüller SLetras MHeidorn CWildermann STeich J(2019)Compilation of Dataflow Applications for Multi-Cores using Adaptive Multi-Objective OptimizationACM Transactions on Design Automation of Electronic Systems10.1145/331024924:3(1-23)Online publication date: 11-Mar-2019
- Show More Cited By