Sfoglia per Autore
Engineering Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach
2019 Mohamad Gharib, Paolo Lollini, Andrea Ceccarelli, Andrea Bondavalli
Citizens as Data Donors: Maximizing Participation Through Privacy Assurance and Behavioral Change
2020 Gharib, Mohamad
Dealing with non-functional requirements, the case of information quality requirements: Experience report
2020 Gharib M.
COPri - A Core Ontology for Privacy Requirements Engineering
2020 Gharib M.; Mylopoulos J.; Giorgini P.
A holistic approach for privacy requirements analysis: An industrial case study
2020 Gharib M.; Giorgini P.; Salnitri M.; Paja E.; Mouratidis H.; Pavlidis M.; Ruiz J.F.
A model to discipline autonomy in cyber-physical systems-of-systems and its application
2020 Gharib M.; Dias da Silva L.; Ceccarelli A.
Governance & Autonomy: Towards a Governance-based Analysis of Autonomy in Cyber-Physical Systems-of-Systems
2020 Gharib, Mohamad; Lollini, Paolo; Ceccarelli, Andrea; Bondavalli, Andrea
Understanding the properness of incorporating machine learning algorithms in safety-critical systems
2021 Gharib M.; Zoppi T.; Bondavalli A.
Meta-learning to improve unsupervised intrusion detection in cyber-physical systems
2021 Zoppi T.; Gharib M.; Atif M.; Bondavalli A.
Quantitative comparison of supervised algorithms and feature sets for traffic sign recognition
2021 Atif M.; Zoppi T.; Gharib M.; Bondavalli A.
An Ontology for Privacy Requirements via a Systematic Literature Review
2021 Gharib M.; Giorgini P.; Mylopoulos J.
IQCPSoS: A Model-Based Approach for Modeling and Analyzing Information Quality Requirements for Cyber-Physical System-of-Systems
2021 Gharib, Mohamad; Lollini, Paolo; Bondavalli, Andrea
On the Properness of Incorporating Binary Classification Machine Learning Algorithms into Safety-Critical Systems
2022 Gharib, Mohamad; Zoppi, Tommaso; Bondavalli, Andrea
Towards Enhancing Traffic Sign Recognition through Sliding Windows
2022 Atif M.; Zoppi T.; Gharib M.; Bondavalli A.
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile