Publications

Export 137 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Ionita D., Kaidalova J., Vasenev A., Wieringa R.J.  2016.  A study on tangible participative enterprise modelling. ER 2016 Workshops AHA, MoBID, MORE-BI, MReBA, QMMQ, and WM2SP, Gifu, Japan, November 14-17, 2016, Proceedings, Gifu, Japan. 9975:139–148.
Remke A.KI, Stoelinga M.IA.  2014.  Stochastic Model Checking: Rigorous Dependability Analysis Using Model Checking Techniques for Stochastic Systems. Lecture Notes in Computer Science. 8453
Jhawar R., Lounis K., Mauw S..  2016.  A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. 12th International Workshop on Security and Trust Management, STM 2016, Heraklion, Crete, Greece. 9871:138–153.
Alexandre D.E, Larsen K.G, Legay A., Mikučionis M..  2013.  Statistical Model Checking in Uppaal: Lets Practice. 1st Workshop on Statistical Model Checking, Rennes, France.
Gollmann D., Herley C., Koenig V., Pieters W., Sasse M.A.  2015.  Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports. 4:1–28.
Uebelacker S., Quiel S..  2014.  The Social Engineering Personality Framework. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST), Vienna, Austria. :24–30.
Arnold F., Guck D., Kumar R., Stoelinga M.IA.  2015.  Sequential and Parallel Attack Tree Modelling. Computer Safety, Reliability, and Security - Proceedings of the SAFECOM 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands. 9338:291–299.
Pieters W., Hadziosmanović D., Dechesne F..  2015.  Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Science and Engineering Ethics. N/A
Pieters W., Hadziosmanović D., Dechesne F..  2016.  Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Science and Engineering Ethics. N/A
Uebelacker S..  2013.  Security-aware organisational cultures as a starting point for mitigating socio-technical risks. Informatik 2013, University of Koblenz-Landau, Koblenz, Germany. P-220:2046–2057.
Lenzini G., Mauw S., Ouchani S..  2015.  Security analysis of socio-technical physical systems. Computers & Electrical Engineering. online
R
Schaff G., Harpes C., Aubigny M., Junger M., Martin R..  2014.  RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences. Ninth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2014, Seville, Spain.
Prakken H., Ionita D., Wieringa R.J.  2013.  Risk assessment as an argumentation game. 14th International Workshop on Computational Logic in Multi-Agent Systems, CLIMA XIV, Corunna, Spain. 8143:357–373.
Guck D..  2017.  Reliable systems - Fault tree analysis via Markov reward automata.
Lenin A..  2015.  Reliable and Efficient Determination of the Likelihood of Rational Attacks.
Bullee J.H, Montoya L., Pieters W., Junger M., Hartel P.H.  2015.  Regression Nodes: Extending attack trees with data from social sciences. Workshop on Socio-Technical Aspects in Security and Trust (STAST), Verona, Italy.
Pieters W., Lukszo Z., Hadziosmanović D., van den Berg J..  2014.  Reconciling Malicious and Accidental Risk in Cyber Security. Journal of Internet Services and Information Security. 4:4–26.
Probst C.W, Hansen R.R.  2013.  Reachability-based impact as a measure for insiderness. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 4:38–48.
Q
Eisentraut C.W, Hermanns H., Schuster J., Turini A., Zhang L..  2013.  The Quest for Minimal Quotients for Probabilistic Automata. 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Rome, Italy. 7795:16–31.
Aslanyan Z., Nielson F., Parker D..  2016.  Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference. 29th IEEE Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal. :105–119.
Kumar R., Stoelinga M.IA.  2017.  Quantitative security and safety analysis with attack-fault trees. Proceeding of the 18th IEEE International Symposium on High Assurance Systems Engineering, Singapore.
Arnold F., Pieters W., Stoelinga M.IA.  2013.  Quantitative penetration testing with item response theory (extended version).
Arnold F., Pieters W., Stoelinga M.IA.  2014.  Quantitative Penetration Testing with Item Response Theory. Journal of Information Assurance and Security. 9:118–127.
Arnold F., Pieters W., Stoelinga M.IA.  2013.  Quantitative penetration testing with item response theory. 9th International Conference on Information Assurance and Security, IAS 2013, Gammarth, Tunisia. :49–54.
Kumar R., Ruijters E.JJ, Stoelinga M.IA.  2015.  Quantitative Attack Tree Analysis via Priced Timed Automata. Proceedings of the 13th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2015, Madrid, Spain. 9268:156–171.

Pages