Publications

Export 21 results:
Author Title Type [ Year(Desc)]
Filters: First Letter Of Last Name is A  [Clear All Filters]
2013
Arnold F., Belinfante A.FE, Van der Berg F.I, Guck D., Stoelinga M.IA.  2013.  DFTCalc: a tool for efficient fault tree analysis. Proceedings of the 32nd International Conference on Computer Safety, Reliability, and Security (SAFECOMP), Toulouse, France. 8153:293–301.
Arnold F., Belinfante A.FE, Van der Berg F.I, Guck D., Stoelinga M.IA.  2013.  DFTCalc: a tool for efficient fault tree analysis (extended version).
Pieters W., Padget J., Dechesne F., Dignum V., Aldewereld H..  2013.  Obligations to enforce prohibitions: on the adequacy of security policies. SIN '13 - Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey. :54–61.
Arnold F., Pieters W., Stoelinga M.IA.  2013.  Quantitative penetration testing with item response theory. 9th International Conference on Information Assurance and Security, IAS 2013, Gammarth, Tunisia. :49–54.
Arnold F., Pieters W., Stoelinga M.IA.  2013.  Quantitative penetration testing with item response theory (extended version).
Alexandre D.E, Larsen K.G, Legay A., Mikučionis M..  2013.  Statistical Model Checking in Uppaal: Lets Practice. 1st Workshop on Statistical Model Checking, Rennes, France.
2014
Pieters W., Padget J., Dechesne F., Dignum V., Aldewereld H..  2014.  Effectiveness of qualitative and quantitative security obligations. Journal of Information Security and Applications. to appear:1–14.
Kordy B., Pouly M., Schweizer P..  2014.  A Probabilistic Framework for Security Scenarios with Dependent Actions. 11th International Conference on Integrated Formal Methods, IFM 2014, Bertinoro, Italy. 8739:256–271.
Arnold F., Pieters W., Stoelinga M.IA.  2014.  Quantitative Penetration Testing with Item Response Theory. Journal of Information Assurance and Security. 9:118–127.
Schaff G., Harpes C., Aubigny M., Junger M., Martin R..  2014.  RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences. Ninth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2014, Seville, Spain.
Arnold F., Hermanns H., Pulungan R., Stoelinga M.IA.  2014.  Time-dependent analysis of attacks. Proceedings of the Third International Conference on Principles and Security of Trust, POST 2014, Grenoble, France. 8414:285–305.
Arnold F., Gebler D., Guck D., Hatefi H..  2014.  A tutorial on interactive Markov chains. Stochastic Model Checking. Rigorous Dependability Analysis Using Model Checking Techniques for Stochastic Systems, Vahrn, Italy. 8453:26–66.
2015
Ivanova M.G, Probst C.W, Hansen R.R, Kammueller F..  2015.  Attack Tree Generation by Policy Invalidation. 9th IFIP WG 11.2 International Conference on Information Security Theory and Practice, WISTP 2015, Heraklion, Crete, Greece. 9311:249–259.
Pieters W., Padget J., Dechesne F., Dignum V., Aldewereld H..  2015.  Effectiveness of qualitative and quantitative security obligations. Journal of Information Security and Applications. 22:3–16.
Aslanyan Z., Ivanova M.G, Nielson F., Probst C.W.  2015.  Modeling and Analysing Socio-Technical Systems. 1st International Workshop on Socio-Technical Perspective in IS development (STPIS), Stockholm, Sweden. 1374:121–124.
Aslanyan Z., Nielson F..  2015.  Pareto Efficient Solution of Attack-Defence Trees. 4th International Conference on Principles of Security and Trust, POST 2015, London, UK. 9036:95–114.
Arnold F., Guck D., Kumar R., Stoelinga M.IA.  2015.  Sequential and Parallel Attack Tree Modelling. Computer Safety, Reliability, and Security - Proceedings of the SAFECOM 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands. 9338:291–299.
2016
Aslanyan Z..  2016.  Formal Analysis of Graphical Security Models.
Aslanyan Z., Nielson F., Parker D..  2016.  Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference. 29th IEEE Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal. :105–119.
Gu M., Aslanyan Z., Probst C.W.  2016.  Understanding How Components of Organisations Contribute to Attacks. 21st Nordic Conference, NordSec 2016, Oulu, Finland. 10014:54–66.
2017
Pieters W., Dechesne F..  2017.  Adversarial risks in social experiments with new technologies. Experimentation beyond the laboratory: new perspectives on technology.