Publications

Export 11 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is C  [Clear All Filters]
2015
Pieters W., Davarynejad M..  2015.  Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers. 9th International Workshop on Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance (DPM), Wroclaw, Poland. 8872:201–215.
Hall P., Heath P., Coles-Kemp L..  2015.  Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity. 1:93–108.
2014
Bleikertz S., Vogel C., Gross T..  2014.  Cloud Radar: Near Real-Time Detection of Security Failures in Dynamic Virtualized Infrastructures. Annual Computer Security Applications Conference (ACSAC), New Orleans, Louisiana.
Kammüller F., Probst C.W.  2014.  Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis. IEEE Security and Privacy Workshops (SPW), San Jose, California. :229–235.
Ionita D..  2014.  Context-sensitive Information security Risk identification and evaluation techniques. 22nd IEEE International Requirements Engineering Conference (RE14), Karlskrona, Sweden. :485–488.
Pieters W., Probst C.W, Lukszo S., Montoya L..  2014.  Cost-effectiveness of Security Measures: A model-based Framework. Approaches and Processes for Managing the Economics of Information Systems. :139–156.
Pieters W., Hadziosmanović D., Dechesne F..  2014.  Cyber Security as Social Experiment. NSPW '14 Proceedings of the 2014 workshop on New Security Paradigms, NSPW 2014, Victoria, BC, Canada. :15–24.