Follow
Zhendong Ma
Zhendong Ma
Luxoft / DXC Technology
Verified email at dxc.com
Title
Cited by
Cited by
Year
Secure vehicular communication systems: design and architecture
P Papadimitratos, L Buttyan, T Holczer, E Schoch, J Freudiger, M Raya, ...
IEEE Communications magazine 46 (11), 100-109, 2008
6962008
Privacy in inter-vehicular networks: Why simple pseudonym change is not enough
B Wiedersheim, Z Ma, F Kargl, P Papadimitratos
2010 Seventh international conference on wireless on-demand network systems …, 2010
2682010
Embedded systems security: Threats, vulnerabilities, and attack taxonomy
D Papp, Z Ma, L Buttyan
2015 13th Annual Conference on Privacy, Security and Trust (PST), 145-152, 2015
1902015
Privacy requirements in vehicular communication systems
F Schaub, Z Ma, F Kargl
2009 International Conference on Computational Science and Engineering 3 …, 2009
1212009
Security engineering for VANETs
F Kargl, Z Ma, E Schoch
4th Workshop on Embedded Security in Cars (escar 2006), 2006
922006
V-tokens for Conditional Pseudonymity in VANETs
F Schaub, F Kargl, Z Ma, M Weber
2010 IEEE Wireless Communication and Networking Conference, 1-6, 2010
832010
The need for safety and cyber-security co-engineering and standardization for highly automated automotive vehicles
E Schoitsch, C Schmittner, Z Ma, T Gruber
Advanced Microsystems for Automotive Applications 2015, 251-261, 2016
792016
A case study of fmvea and chassis as safety and security co-analysis method for automotive cyber-physical systems
C Schmittner, Z Ma, E Schoitsch, T Gruber
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 69-80, 2015
752015
Using SAE J3061 for automotive security requirement engineering
C Schmittner, Z Ma, C Reyes, O Dillinger, P Puschner
International Conference on Computer Safety, Reliability, and Security, 157-170, 2016
652016
Limitation and improvement of STPA-Sec for safety and security co-analysis
C Schmittner, Z Ma, P Puschner
International Conference on Computer Safety, Reliability, and Security, 195-209, 2016
632016
A survey on threats and vulnerabilities in smart metering infrastructures
F Skopik, Z Ma, T Bleier, H Grüneis
International Journal of Smart Grid and Clean Energy 1 (1), 22-28, 2012
592012
Security analysis of urban railway systems: the need for a cyber-physical perspective
B Chen, C Schmittner, Z Ma, WG Temple, X Dong, DL Jones, WH Sanders
International conference on computer safety, reliability, and security, 277-290, 2014
582014
A location privacy metric for v2x communication systems
Z Ma, F Kargl, M Weber
2009 IEEE Sarnoff Symposium, 1-6, 2009
572009
Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications
Z Ma, F Kargl, M Weber
2008 IEEE 68th Vehicular Technology Conference, 1-5, 2008
552008
FMVEA for safety and security analysis of intelligent and cooperative vehicles
C Schmittner, Z Ma, P Smith
International Conference on Computer Safety, Reliability, and Security, 282-288, 2014
492014
Security viewpoint in a reference architecture model for cyber-physical production systems
Z Ma, A Hudic, A Shaaban, S Plosz
2017 IEEE European symposium on security and privacy workshops (EuroS&PW …, 2017
432017
Threat modeling for automotive security analysis
Z Ma, C Schmittner
Advanced Science and Technology Letters 139, 333-339, 2016
412016
Status of the development of ISO/SAE 21434
C Schmittner, G Griessnig, Z Ma
European Conference on Software Process Improvement, 504-513, 2018
402018
Measuring long-term location privacy in vehicular communication systems
Z Ma, F Kargl, M Weber
Computer Communications 33 (12), 1414-1427, 2010
392010
Attack vectors to metering data in smart grids under security constraints
F Skopik, Z Ma
2012 IEEE 36th Annual Computer Software and Applications Conference …, 2012
362012
The system can't perform the operation now. Try again later.
Articles 1–20