Publications
Export 13 results:
[ Author
] Title Type Year Filters: First Letter Of Title is M [Clear All Filters]
.
2015. Modeling and Analysing Socio-Technical Systems. 1st International Workshop on Socio-Technical Perspective in IS development (STPIS), Stockholm, Sweden. 1374:121–124.
.
2015. Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security. New Security Paradigm Workshop (NSPW), Twente, Netherlands. :1–15.
.
2014. Modeling Human Behaviour with Higher Order Logic: Insider Threats. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST), Vienna, Austria. :31–39.
.
2015. Modelling Social-Technical Attacks with Timed Automata. Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Denver, Colorado, US. :21–28.
.
2016. Modelling Attack-defense Trees Using Timed Automata. 14th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2016, Quebec, QC, Canada. 9884:35–50.
.
2014. Modelling and analysis of Markov reward automata. Proceedings of the 12th International Symposium on Automated Technology for Verification and Analysis, ATVA 2014, Sydney, NSW, Australia. 8837:168–184.
.
2014. Meer vrouwen in de ict, waarom eigenlijk? Bits en chips. 9:20–21.
.
2014. Modelling telecom fraud with e3value.
.
2016. Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal.
.
2015. Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal. 99:1–12.
.
2014. Model-based Abstraction of Data Provenance. 6th USENIX Workshop on the Theory and Practice of Provenance, Cologne, Germany. :Article3.
.
2016. Maintenance analysis and optimization via statistical model checking: Evaluating a train pneumatic compressor. Proceedings of the 13th International Conference on Quantitative Evaluation of SysTems, QEST 2016, Québec City, Canada. 9826


