default search action
Maximilian Walter
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b1]Maximilian Walter:
Context-based Access Control and Attack Modelling and Analysis. Karlsruhe Institute of Technology, Germany, 2024 - [c21]Sebastian Hahner, Maximilian Walter, Robert Heinrich, Ralf H. Reussner:
Architecture-based Propagation Analyses Regarding Security. Software Engineering 2024: 121-122 - 2023
- [j5]Maximilian Walter, Sebastian Hahner, Tomás Bures, Petr Hnetynka, Robert Heinrich, Ralf H. Reussner:
Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0. Autom. 71(6): 443-452 (2023) - [j4]Nicolas Boltz, Maximilian Walter, Christopher Gerking:
Designing Automotive Case Studies for Architectural Security Analyses. Softwaretechnik-Trends 43(4) (2023) - [j3]Tomás Bures, Petr Hnetynka, Martin Krulis, Frantisek Plásil, Danylo Khalyeyev, Sebastian Hahner, Stephan Seifermann, Maximilian Walter, Robert Heinrich:
Generating adaptation rule-specific neural networks. Int. J. Softw. Tools Technol. Transf. 25(5): 733-746 (2023) - [c20]Maximilian Walter, Robert Heinrich, Ralf H. Reussner:
Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents. ECSA 2023: 37-53 - [c19]Sebastian Hahner, Tizian Bitschi, Maximilian Walter, Tomás Bures, Petr Hnetynka, Robert Heinrich:
Model-based Confidentiality Analysis under Uncertainty. ICSA-C 2023: 256-263 - [c18]Yves Richard Kirschner, Maximilian Walter, Florian Bossert, Robert Heinrich, Anne Koziolek:
Automatic Derivation of Vulnerability Models for Software Architectures. ICSA-C 2023: 276-283 - [c17]Maximilian Walter, Robert Heinrich, Ralf H. Reussner:
Identifizierung von Vertraulichkeitsproblemen mithilfe von Angriffsausbreitung auf Architektur. Software Engineering 2023: 123-124 - [i2]Felix Schwickerath, Nicolas Boltz, Sebastian Hahner, Maximilian Walter, Christopher Gerking, Robert Heinrich:
Tool-Supported Architecture-Based Data Flow Analysis for Confidentiality. CoRR abs/2308.01645 (2023) - 2022
- [c16]Maximilian Walter, Ralf H. Reussner:
Tool-Based Attack Graph Estimation and Scenario Analysis for Software Architectures. ECSA (Tracks and Workshops) 2022: 45-61 - [c15]Nicolas Boltz, Sebastian Hahner, Maximilian Walter, Stephan Seifermann, Robert Heinrich, Tomás Bures, Petr Hnetynka:
Handling Environmental Uncertainty in Design Time Access Control Analysis. SEAA 2022: 382-389 - [c14]Maximilian Walter, Robert Heinrich, Ralf H. Reussner:
Architectural Attack Propagation Analysis for Identifying Confidentiality Issues. ICSA 2022: 1-12 - [c13]Maximilian Walter, Robert Heinrich, Ralf H. Reussner:
Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues. ICSA Companion 2022: 59 - [c12]Tomás Bures, Petr Hnetynka, Martin Krulis, Frantisek Plásil, Danylo Khalyeyev, Sebastian Hahner, Stephan Seifermann, Maximilian Walter, Robert Heinrich:
Attuning Adaptation Rules via a Rule-Specific Neural Network. ISoLA (3) 2022: 215-230 - [p1]Robert Heinrich, Stephan Seifermann, Maximilian Walter, Sebastian Hahner, Ralf H. Reussner, Tomás Bures, Petr Hnetynka, Jan Pacovský:
Dynamic Access Control in Industry 4.0 Systems. Digital Transformation 2022: 143-170 - 2021
- [c11]Angelika Kaplan, Maximilian Walter, Robert Heinrich:
A Classification for Managing Software Engineering Knowledge. EASE 2021: 340-346 - [c10]Stephan Seifermann, Maximilian Walter, Sebastian Hahner, Robert Heinrich, Ralf H. Reussner:
Identifying Confidentiality Violations in Architectural Design Using Palladio (short paper). ECSA (Companion) 2021 - [c9]Maximilian Walter, Sebastian Hahner, Stephan Seifermann, Tomás Bures, Petr Hnetynka, Jan Pacovský, Robert Heinrich:
Architectural Optimization for Confidentiality Under Structural Uncertainty. ECSA (Tracks and Workshops) 2021: 309-332 - [c8]Tomás Bures, Ilias Gerostathopoulos, Petr Hnetynka, Stephan Seifermann, Maximilian Walter, Robert Heinrich:
Aspect-Oriented Adaptation of Access Control Rules. SEAA 2021: 363-370 - [c7]Sebastian Hahner, Stephan Seifermann, Robert Heinrich, Maximilian Walter, Tomás Bures, Petr Hnetynka:
Modeling Data Flow Constraints for Design-Time Confidentiality Analyses. ICSA Companion 2021: 15-21 - [i1]Tomás Bures, Petr Hnetynka, Martin Krulis, Danylo Khalyeyev, Sebastian Hahner, Stephan Seifermann, Maximilian Walter, Robert Heinrich:
Towards fuzzification of adaptation rules in self-adaptive architectures. CoRR abs/2112.09468 (2021) - 2020
- [j2]Maximilian Walter, Stephan Seifermann, Robert Heinrich:
A Taxonomy of Dynamic Changes Affecting Confidentiality. Softwaretechnik-Trends 40(2): 35-36 (2020) - [j1]Malte Reimann, Stephan Seifermann, Maximilian Walter, Robert Heinrich, Tomás Bures, Petr Hnetynka:
Towards Language-Agnostic Reuse of Palladio Quality Analyses. Softwaretechnik-Trends 40(3): 46-48 (2020) - [c6]Nicolas Boltz, Maximilian Walter, Robert Heinrich:
Context-Based Confidentiality Analysis for Industrial IoT. SEAA 2020: 589-596 - [c5]Tomás Bures, Petr Hnetynka, Robert Heinrich, Stephan Seifermann, Maximilian Walter:
Capturing Dynamicity and Uncertainty in Security and Trust via Situational Patterns. ISoLA (2) 2020: 295-310 - [c4]Angelika Kaplan, Jan Keim, Yves Schneider, Maximilian Walter, Dominik Werle, Anne Koziolek, Ralf H. Reussner:
Teaching Programming at Scale. SEUH 2020: 2-6
2010 – 2019
- 2019
- [c3]Rima Al Ali, Petr Hnetynka, Jiri Havlik, Vlastimil Krivka, Robert Heinrich, Stephan Seifermann, Maximilian Walter, Adrian Juan Verdejo:
Dynamic security rules for legacy systems. ECSA (Companion) 2019: 277-284 - [c2]Stephan Seifermann, Maximilian Walter:
Evolving a Use Case for Industry 4.0 Environments Towards Integration of Physical Access Control. Software Engineering (Workshops) 2019: 106-108 - 2018
- [c1]Rima Al Ali, Robert Heinrich, Petr Hnetynka, Adrian Juan Verdejo, Stephan Seifermann, Maximilian Walter:
Modeling of dynamic trust contracts for industry 4.0 systems. ECSA (Companion) 2018: 45:1-45:4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint