[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/conf/icsoft/0003GSBL23>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Chetan_Sharma>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Christian_Biermann>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Jyoti_Gautam>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Richard_May_0003>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Thomas_Leich>
foaf:homepage <http://dx.doi.org/doi.org%2F10.5220%2F0012006700003538>
foaf:homepage <https://doi.org/10.5220/0012006700003538>
dc:identifier DBLP conf/icsoft/0003GSBL23 (xsd:string)
dc:identifier DOI doi.org%2F10.5220%2F0012006700003538 (xsd:string)
dcterms:issued 2023 (xsd:gYear)
rdfs:label A Systematic Mapping Study on Security in Configurable Safety-Critical Systems Based on Product-Line Concepts. (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Chetan_Sharma>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Christian_Biermann>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Jyoti_Gautam>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Richard_May_0003>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Thomas_Leich>
swrc:pages 217-224 (xsd:string)
dcterms:partOf <https://dblp.l3s.de/d2r/resource/publications/conf/icsoft/2023>
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/conf/icsoft/0003GSBL23/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/conf/icsoft/0003GSBL23>
rdfs:seeAlso <http://dblp.uni-trier.de/db/conf/icsoft/icsoft2023.html#0003GSBL23>
rdfs:seeAlso <https://doi.org/10.5220/0012006700003538>
swrc:series <https://dblp.l3s.de/d2r/resource/conferences/icsoft>
dc:title A Systematic Mapping Study on Security in Configurable Safety-Critical Systems Based on Product-Line Concepts. (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:InProceedings
rdf:type foaf:Document