Publications

Export 7 results:
Author Title Type [ Year(Desc)]
Filters: First Letter Of Last Name is F  [Clear All Filters]
2013
Timmer M., van de Pol J.C, Stoelinga M.IA.  2013.  Confluence Reduction for Markov Automata. Proceedings of the 11th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS), Buenos Aires, Argentina. 8053:243–257.
Feng Y., Zhang L..  2013.  A tighter bound for the self-stabilization time in Herman's algorithm. Information processing letters. 113:486–488.
2016
Fichtner L., Pieters W., Texeira A..  2016.  Cybersecurity as a Politikum: Implications of Security Discourses for Infrastructures. New Security Paradigms Workshop (NSPW), Colorado, USA.
Fetler B., Harpes C..  2016.  Information Security Maturity as an Integral Part of ISMS based Risk Management Tools. SECURWARE 2016, The Tenth International Conference on Emerging Security Information, Systems and Technologies, Nice, France. :295–298.
Pieters W., Barendse J., Ford M., Heath C.PR, Probst C.W, Verbij R..  2016.  The Navigation Metaphor in Security Economics. IEEE Security & Privacy. 14:14–21.
Fraile M., Ford M., Gadyatskaya O., Kumar R., Stoelinga M.IA, Trujillo-Rasua R..  2016.  Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study. 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling (PoEM), Skövde, Sweden. 267:326–334.
Fraile M., Ford M., Gadyatskaya O., Kumar R., Stoelinga M.IA, Trujillo-Rasua R..  2016.  Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study. 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling (PoEM), Skövde, Sweden. 267:326–334.