Publications
Export 45 results:
Author [ Title
] Type Year Filters: First Letter Of Last Name is S [Clear All Filters]
.
2016. The Value of Attack-Defence Diagrams. Proceedings of the 5th International Conference on Principles of Security and Trust, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, Netherlands. 9635:163–185.
.
2016. Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study. 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling (PoEM), Skövde, Sweden. 267:326–334.
.
2017. Uniform analysis of fault trees through model transformations. Proceedings of the 63rd Annual Reliabliity and Maintainability Symposium (RAMS 2017), Orlando, FL, USA.
.
2017. Uniform analysis of fault trees through model transformations. Proceedings of the 63rd Annual Reliabliity and Maintainability Symposium (RAMS 2017), Orlando, FL, USA.
.
2016. Uncovering dynamic fault trees. Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), Toulouse, France. :299–310.
.
2014. A tutorial on interactive Markov chains. Stochastic Model Checking. Rigorous Dependability Analysis Using Model Checking Techniques for Stochastic Systems, Vahrn, Italy. 8453:26–66.
.
2014. Time-dependent analysis of attacks. Proceedings of the Third International Conference on Principles and Security of Trust, POST 2014, Grenoble, France. 8414:285–305.
.
2015. Time dependent analysis with dynamic counter measure trees. Proceedings of the 13th Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2015), London, England.
.
2014. Stochastic Model Checking: Rigorous Dependability Analysis Using Model Checking Techniques for Stochastic Systems. Lecture Notes in Computer Science. 8453
.
2015. Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports. 4:1–28.
.
2015. Sequential and Parallel Attack Tree Modelling. Computer Safety, Reliability, and Security - Proceedings of the SAFECOM 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands. 9338:291–299.
.
2014. RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences. Ninth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2014, Seville, Spain.
.
2013. Risk assessment as an argumentation game. 14th International Workshop on Computational Logic in Multi-Agent Systems, CLIMA XIV, Corunna, Spain. 8143:357–373.
.
2013. The Quest for Minimal Quotients for Probabilistic Automata. 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Rome, Italy. 7795:16–31.
.
2017. Quantitative security and safety analysis with attack-fault trees. Proceeding of the 18th IEEE International Symposium on High Assurance Systems Engineering, Singapore.
.
2014. Quantitative Penetration Testing with Item Response Theory. Journal of Information Assurance and Security. 9:118–127.
.
2013. Quantitative penetration testing with item response theory. 9th International Conference on Information Assurance and Security, IAS 2013, Gammarth, Tunisia. :49–54.
.
2015. Quantitative Attack Tree Analysis via Priced Timed Automata. Proceedings of the 13th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2015, Madrid, Spain. 9268:156–171.
.
2016. Probabilistic reasoning with graphical security models. Information sciences. 342:111–131.
.
2014. A Probabilistic Framework for Security Scenarios with Dependent Actions. 11th International Conference on Integrated Formal Methods, IFM 2014, Bertinoro, Italy. 8739:256–271.
.
2014. A Probabilistic Framework for Security Scenarios with Dependent Actions. 11th International Conference on Integrated Formal Methods, IFM 2014, Bertinoro, Italy. 8739:256–271.
.
2014. Modelling and analysis of Markov reward automata. Proceedings of the 12th International Symposium on Automated Technology for Verification and Analysis, ATVA 2014, Sydney, NSW, Australia. 8837:168–184.
.
2014. Meer vrouwen in de ict, waarom eigenlijk? Bits en chips. 9:20–21.
.
2014. Meer vrouwen in de ict, waarom eigenlijk? Bits en chips. 9:20–21.


