Publications
.
2016. A study on tangible participative enterprise modelling. ER 2016 Workshops AHA, MoBID, MORE-BI, MReBA, QMMQ, and WM2SP, Gifu, Japan, November 14-17, 2016, Proceedings, Gifu, Japan. 9975:139–148.
.
2014. Stochastic Model Checking: Rigorous Dependability Analysis Using Model Checking Techniques for Stochastic Systems. Lecture Notes in Computer Science. 8453
.
2016. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. 12th International Workshop on Security and Trust Management, STM 2016, Heraklion, Crete, Greece. 9871:138–153.
.
2013. Statistical Model Checking in Uppaal: Lets Practice. 1st Workshop on Statistical Model Checking, Rennes, France.
.
2015. Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports. 4:1–28.
.
2014. The Social Engineering Personality Framework. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST), Vienna, Austria. :24–30.
.
2015. Sequential and Parallel Attack Tree Modelling. Computer Safety, Reliability, and Security - Proceedings of the SAFECOM 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands. 9338:291–299.
.
2015. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Science and Engineering Ethics. N/A
.
2016. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Science and Engineering Ethics. N/A
.
2013. Security-aware organisational cultures as a starting point for mitigating socio-technical risks. Informatik 2013, University of Koblenz-Landau, Koblenz, Germany. P-220:2046–2057.
.
2015. Security analysis of socio-technical physical systems. Computers & Electrical Engineering. online
.
2014. RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences. Ninth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2014, Seville, Spain.
.
2013. Risk assessment as an argumentation game. 14th International Workshop on Computational Logic in Multi-Agent Systems, CLIMA XIV, Corunna, Spain. 8143:357–373.
.
2015. Regression Nodes: Extending attack trees with data from social sciences. Workshop on Socio-Technical Aspects in Security and Trust (STAST), Verona, Italy.
.
2014. Reconciling Malicious and Accidental Risk in Cyber Security. Journal of Internet Services and Information Security. 4:4–26.
.
2013. Reachability-based impact as a measure for insiderness. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 4:38–48.
.
2013. The Quest for Minimal Quotients for Probabilistic Automata. 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Rome, Italy. 7795:16–31.
.
2016. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference. 29th IEEE Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal. :105–119.
.
2017. Quantitative security and safety analysis with attack-fault trees. Proceeding of the 18th IEEE International Symposium on High Assurance Systems Engineering, Singapore.
.
2014. Quantitative Penetration Testing with Item Response Theory. Journal of Information Assurance and Security. 9:118–127.
.
2013. Quantitative penetration testing with item response theory. 9th International Conference on Information Assurance and Security, IAS 2013, Gammarth, Tunisia. :49–54.
.
2015. Quantitative Attack Tree Analysis via Priced Timed Automata. Proceedings of the 13th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2015, Madrid, Spain. 9268:156–171.

] 
