The TREsPASS Project
Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security
Navigation
Home
Results and Future Research
Partners
News
Documents
Publications
Contact
Search form
Search
You are here
Home
» Publications
Publications
Search
Show only items where
Author
any
Ahmad, W.
Akram, Naeem
Albert, E.
Aldewereld, H.
Alexandre, D. E.
Arnold, F.
Aslanyan, Z.
Asveld, L.
Aubigny, M.
Baltuta, A.
Barendse, J.
Belinfante, A. F. E.
Benenson, Z.
Bleikertz, S.
Boender, J.
Borangiu, T.
Braberman, V. A.
Brodbeck, F.
Buldas, A.
Bullee, J. H.
Charnamord, A.
Chen, T.
Chockalingam, S.
Choo, R.
Coles-Kemp, L.
Davarynejad, M.
David, N.
David, A.
de Groote, E.
De Lara, J.
Dechesne, F.
Dignum, V.
Dimkov, T.
Dingel, J.
Dodds, M.
Doerr, C.
Dragoicea, M.
Drolenga, P.
Eisentraut, C. W.
Eisentraut, C.
Ekstedt, M.
España, S.
Feng, Y.
Fetler, B.
Fichtner, L.
Ford, M.
Fraile, M.
Fribourg, L.
Gadyatskaya, O.
Gebler, D.
Godesken, J. C.
Gollmann, D.
Gordijn, J.
Gross, T.
Gu, M.
Guck, D.
Hadziosmanović, D.
Hall, P. A.
Hall, P.
Hankin, C.
Hansen, R. R.
Hansen, Rydhof
Harpes, C.
Hartel, P. H.
Hatefi, H.
Heath, C. P. R.
Heath, C. P.
Heath, P.
Herley, C.
Hermanns, H.
Hölzenspies, P. K. F.
Horbach, M.
Huisman, M.
Ionita, D.
Ivanova, M. G.
Jacobs, V.
Jajodia, S.
Jhawar, R.
Johannesson, P.
Jonkers, H.
Junger, M.
Junges, S.
Kaidalova, J.
Kammueller, F.
Kammüller, F.
Kargidis, T.
Katoen, J. P.
Katsaros, P.
Kegel, R. H. P.
Kerber, M.
Kim, Seong
Ko, R.
Koenen, S. K.
Koenig, V.
Koornneef, F.
Kordy, P.
Kordy, B. K.
Kordy, B.
Krämer, J.
Krämer, J. P.
Krčál, J.
Kumar, R.
Labunets, K.
Larsen, K. G.
Lastdrager, E. E. H.
Lee, Li
Legay, A.
Leite, J.
Lenin, A.
Lenzini, G.
Li, E.
Li, X.
Liddle, S. W.
Liu, Z.
Lounis, K.
Lúcio, L.
Lukszo, S.
Lukszo, Z.
Marinelli, L.
Martin, R.
Mastelic, T.
Mauw, S.
Mehos, D. C.
Mikučionis, M.
Montoya, L.
Morales, A. L. Montoya
Muller, S.
Muller, C.
Nemli, I.
Nidd, M.
Nielson, F.
Novoa, H.
Olesen, M. C.
Oliveira, D.
Opdahl, A. L.
ópez, L
Ouchani, S.
Overink, F. J.
Paci, F.
Padget, J.
Paige, R. F.
Pape, S.
Parker, D.
Parkin, S.
Pastor, O.
Peters, M.
Piessens, F.
Pieters, W.
Piètre-Cambacédès, L.
Poskitt, C.
Poulsen, D. B.
Pouly, M.
Prakken, H.
Primierio, G.
Probst, C. W.
Pulungan, R.
Quartel, D. A. C.
Quiel, S.
Radomirović, S.
Ralyté, R.
Remke, A. K. I.
Rensink, A.
Ruijters, E. J. J.
Salaün, G.
Sari, Permata
Sari, D.
Sasse, M. A.
Schaff, G.
Schätz, B.
Schivo, S.
Schuster, J.
Schweitzer, P. R. J.
Schweitzer, P.
Schweizer, P.
Sekereinsk, E.
Son, T. C.
Song, L.
Stoelinga, M. I. A.
Sytema, M.
Tanner, A.
Texeira, A.
Timmer, M.
Torrini, P.
Trujillo-Rasua, R.
Tsiakis, T.
Turini, A.
Uebelacker, S.
van de Poel, I.
van de Pol, J. C.
van den Berg, J.
Van der Berg, F. I.
Van Der Torre, L.
van der Wagen, W.
van Gelder, P.
Van Gulijk, C.
van Wieren, M.
Vangheluwe, H.
Vasenev, A.
Verbij, R.
Viganò, L.
Vogel, C.
Wieringa, R. J.
Willemson, J.
Wolos, L.
Woltran, S.
Yesuf, A. S.
Yi, W.
Zakiuddin, I.
Zhang, L.
Type
any
Book Chapter
Conference Paper
Thesis
Journal Article
Book
Miscellaneous
Conference Proceedings
Term
any
Year
any
2017
2016
2015
2014
2013
Keyword
any
abstraction
Actor-Network Theory
Adversarial experiments
adversarial risk analysis
agency
analysis
APT
Archimate
Attack
Attack and defense modeling
attack generation
Attack Navigator
attack navigators
Attack Tree
Attack Tree Generation
attack trees
Attack-defense tree
Attack-fault trees
Attacker
Attacker models
attacker motivation
attacker profiles
Attacker utility
Authority
Automated verification
Awareness
Bayesian networks
Behavioral optimization
Bifurcation
botnets
business value
CADP
Case studies
cloud computing
comparative security
Confluence
Control strength
costs
counter measure trees
Credentials
Cyber Security
Cyber-attack
cyberattacks
cybercrime
cyborg crime
Decay
Design ethics Inseparability
Divergence-sensitive branching bisimulation
Dynamic Fault trees
e-commerce
e-services
Economic models
Empirical security
Enterprise architecture
enterprise models
evaluator4
Experiment
factor analysis of information risk
Fault Maintenance Trees
Fault Tree Analysis
Fault Trees
Fitness functions
Formal engineering
Formal methods
formal modeling
Formal Modelling
Framkeworks
Fraud
Governance and control
Graph Transformation
Graphical models for security
Graphs
hackers
Heterogeneous
Human factors
impact estimation
Incentives
induced risk
Information Security
Information Systems
insider threat
Insider threats
Interactive Markov chains
Internet/Web technologies
Intervention
IOCO
item response theory
JTorX
logic
logics
LPS
lps2torx
LTSmin
maintenance
Malicious Insider Threats
Markov automata
Markov reward automata
Markov Reward Models
Markov-automata
MCL
mCRL2
Mean-Field Approximation
meta-modelling
Methodologies
model checking
Model-based testing
Multi parameter attack trees
multi-step attacks
Multiprocessor
navigation
navigator
Non-deterministic
obligations
organisational culture
Oscillatory Behavior
participatory modelling
penetration testing
Personalisation
Persuasion
phase type
Policy Invalidation
Probabilistic
Probabilistic analysis
Process algebra
Product impact
prohibitions
Quantitative
Quantitative analysis
Quantitative and qualitative security assessment
quantitative security
reachability
Reduction
refinement
Regression
Reliability
Reliability analysis
Responsibility
Responsible experimentation
Retention
return on security investment
rewards
Risk
Risk analysis
Risk and security modelling
Risk Assessment
Risk Management
Safety and security modelling
Scam
Scheduling
security
Security Analysis
Security Assessment
security awareness
Security by design
security economics
Security measures
security metrics
security models
security policies
security risk assessment
Security risk management
Security-by-experiment
Seq-AND
SEQ-OR
Service impact
simulation
Smart grids
Smash-and-Grab
social engineering
Social Experiment
Social experiments
socio-technical
socio-technical security
Socio-Technical Systems
State space reduction
stochastic
Stochastic model checking
stochastic timed automata
Synchronous Dataflow Graph
system models
tangible modelling
technical mediation
Technological mediation
Telecom fraud
Telephone
threat event frequency
Throughput
Time
time dependent analysis
Timed Automata
Tools
Training
usability experiment
Value modelling
value models
visualization
weakest link.
Export 0 results:
BibTex
[
Author
]
Title
Type
Year
Filters:
First Letter Of Last Name
is
D
and
Author
is
D. Hadziosmanović
[Clear All Filters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
No items found
Modify
or
remove
your filters and try again.