Publications

Export 6 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is N  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Ionita D., Wieringa R.J, Gordijn J..  2016.  Automated Identification and Prioritization of Business Risks in e-service Networks. Proceedings of the 7th International Conference on Exploring Service Science, IESS 2016, Bucharest, Romania. 247:547–560.
M
Aslanyan Z., Ivanova M.G, Nielson F., Probst C.W.  2015.  Modeling and Analysing Socio-Technical Systems. 1st International Workshop on Socio-Technical Perspective in IS development (STPIS), Stockholm, Sweden. 1374:121–124.
P
Aslanyan Z., Nielson F..  2015.  Pareto Efficient Solution of Attack-Defence Trees. 4th International Conference on Principles of Security and Trust, POST 2015, London, UK. 9036:95–114.
Chen T., Kammueller F., Nemli I., Probst C.W.  2015.  A Probabilistic Analysis Framework for Malicious Insider Threats. Third International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Los Angeles, US. 9190:178–189.
Q
Aslanyan Z., Nielson F., Parker D..  2016.  Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference. 29th IEEE Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal. :105–119.