default search action
Kaj Hänninen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c26]Malina Adach, Nazakat Ali, Kaj Hänninen, Kristina Lundqvist:
Hazard Analysis on a System of Systems using the Hazard Ontology. SoSE 2023: 1-6 - 2022
- [c25]Malina Adach, Kaj Hänninen, Kristina Lundqvist:
Security Ontologies: A Systematic Literature Review. EDOC 2022: 36-53 - [c24]Malina Adach, Kaj Hänninen, Kristina Lundqvist:
Concepts and Relationships in Safety and Security Ontologies: A Comparative Study. ICSRS 2022: 357-364 - [c23]Malina Adach, Kaj Hänninen, Kristina Lundqvist:
A Combined Security Ontology based on the Unified Foundational Ontology. ICSC 2022: 187-194 - 2021
- [c22]Luciana Provenzano, Kaj Hänninen, Kristina Lundqvist:
Role-based Approach as Support for Safety Analysis of Collaborative Systems. DASC/PiCom/CBDCom/CyberSciTech 2021: 92-98 - [c21]Jukka Mäki-Turja, Kaj Hänninen, Mikael Sjödin:
On Sustainability for Offset Based Response-Time Analysis. ECBS 2021: 12:1-12:7
2010 – 2019
- 2018
- [c20]Elena Lisova, Aida Causevic, Kaj Hänninen, Henrik Thane, Hans Hansson:
A Systematic Way to Incorporate Security in Safety Analysis. DSN Workshops 2018: 166-171 - [i1]Kaj Hänninen, Hans Hansson, Henrik Thane, Mehrdad Saadatmand:
Inadequate Risk Analysis Might Jeopardize The Functional Safety of Modern Systems. CoRR abs/1808.10308 (2018) - 2017
- [c19]Luciana Provenzano, Kaj Hänninen, Jiale Zhou, Kristina Lundqvist:
An Ontological Approach to Elicit Safety Requirements. APSEC 2017: 713-718 - [c18]Jiale Zhou, Kaj Hänninen, Kristina Lundqvist:
A Hazard Modeling Language for Safety-Critical Systems Based on the Hazard Ontology. SEAA 2017: 301-304 - [c17]Andreas Johnsen, Gordana Dodig Crnkovic, Kristina Lundqvist, Kaj Hänninen, Paul Pettersson:
Risk-Based Decision-Making Fallacies: Why Present Functional Safety Standards are Not Enough. ICSA Workshops 2017: 153-160 - [c16]Jiale Zhou, Kaj Hänninen, Kristina Lundqvist, Luciana Provenzano:
An ontological approach to identify the causes of hazards for safety-critical systems. ICSRS 2017: 405-413 - [c15]Andreas Johnsen, Kristina Lundqvist, Kaj Hänninen, Paul Pettersson:
AQAT: The Architecture Quality Assurance Tool for Critical Embedded Systems. ISSRE 2017: 260-270 - [c14]Andreas Johnsen, Kristina Lundqvist, Kaj Hänninen, Paul Pettersson, Martin Torelm:
Experience Report: Evaluating Fault Detection Effectiveness and Resource Efficiency of the Architecture Quality Assurance Framework and Tool. ISSRE 2017: 271-281 - [c13]Luciana Provenzano, Kaj Hänninen:
Specifying Software Requirements for Safety-Critical Railway Systems: An Experience Report. REFSQ 2017: 363-369 - 2016
- [c12]Andreas Johnsen, Kristina Lundqvist, Kaj Hänninen, Paul Pettersson, Martin Torelm:
AQAF: An Architecture Quality Assurance Framework for Systems Modeled in AADL. QoSA 2016: 31-40 - 2015
- [c11]Jiale Zhou, Kaj Hänninen, Kristina Lundqvist, Yue Lu, Luciana Provenzano, Kristina Forsberg:
An environment-driven ontological approach to requirements elicitation for safety-critical systems. RE 2015: 247-251 - 2014
- [c10]Andreas Johnsen, Kristina Lundqvist, Paul Pettersson, Kaj Hänninen:
Regression verification of AADL models through slicing of system dependence graphs. QoSA 2014: 103-112
2000 – 2009
- 2008
- [c9]Mikael Nolin, Jukka Mäki-Turja, Kaj Hänninen:
Achieving Industrial Strength Timing Predictions of Embedded System Behavior. ESA 2008: 173-178 - [c8]Markus Bohlin, Kaj Hänninen, Jukka Mäki-Turja, Jan Carlson, Mikael Nolin:
Bounding Shared-Stack Usage in Systems with Offsets and Precedences. ECRTS 2008: 276-285 - [c7]Kaj Hänninen, Jukka Mäki-Turja, Staffan Sandberg, John Lundbäck, Mats Lindberg, Mikael Nolin, Kurt-Lennart Lundbäck:
Framework for real-time analysis in Rubus-ICE. ETFA 2008: 782-788 - [c6]Kaj Hänninen, Jukka Mäki-Turja, Mikael Nolin, Mats Lindberg, John Lundbäck, Kurt-Lennart Lundbäck:
The Rubus component model for resource constrained real-time systems. SIES 2008: 177-183 - 2006
- [c5]Jukka Mäki-Turja, Mikael Nolin, Kaj Hänninen:
Towards Efficient Development of Embedded Real-Time Systems, the Component Based Approach. ESA 2006: 67-71 - [c4]Kaj Hänninen, Jukka Mäki-Turja, Mikael Nolin:
Present and Future Requirements in Developing Industrial Embedded Real-Time Systems - Interviews with Designers in the Vehicle Domain. ECBS 2006: 139-150 - [c3]Kaj Hänninen, Jukka Mäki-Turja, Markus Bohlin, Jan Carlson, Mikael Nolin:
Determining Maximum Stack Usage in Preemptive Shared Stack Systems. RTSS 2006: 445-453 - 2005
- [c2]Kaj Hänninen, John Lundbäck, Kurt-Lennart Lundbäck, Jukka Mäki-Turja, Mikael Nolin:
Efficient Event-Triggered Tasks in an RTOS. ESA 2005: 31-37 - [c1]Mikael Nolin, Kaj Hänninen, Jukka Mäki-Turja:
Efficient Development of Real-Time Systems Using Hybrid Scheduling. ESA 2005: 53-59
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint