Export 13 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is M  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Ruijters E.JJ, Guck D., Drolenga P., Peters M., Stoelinga M.IA.  2016.  Maintenance analysis and optimization via statistical model checking: Evaluating a train pneumatic compressor. Proceedings of the 13th International Conference on Quantitative Evaluation of SysTems, QEST 2016, Québec City, Canada. 9826
Benenson Z., Lenzini G., Oliveira D., Parkin S., Uebelacker S..  2015.  Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security. New Security Paradigm Workshop (NSPW), Twente, Netherlands. :1–15.
Huisman M., Stoelinga M.IA.  2014.  Meer vrouwen in de ict, waarom eigenlijk? Bits en chips. 9:20–21.
Probst C.W, Hansen R.R.  2014.  Model-based Abstraction of Data Provenance. 6th USENIX Workshop on the Theory and Practice of Provenance, Cologne, Germany. :Article3.
Aslanyan Z., Ivanova M.G, Nielson F., Probst C.W.  2015.  Modeling and Analysing Socio-Technical Systems. 1st International Workshop on Socio-Technical Perspective in IS development (STPIS), Stockholm, Sweden. 1374:121–124.
Kammüller F., Probst C.W.  2016.  Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal.
Kammüller F., Probst C.W.  2015.  Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal. 99:1–12.
Boender J., Ivanova M.G, Kammüller F., Primierio G..  2014.  Modeling Human Behaviour with Higher Order Logic: Insider Threats. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST), Vienna, Austria. :31–39.
Guck D., Timmer M., Hatefi H., Ruijters E.JJ, Stoelinga M.IA.  2014.  Modelling and analysis of Markov reward automata. Proceedings of the 12th International Symposium on Automated Technology for Verification and Analysis, ATVA 2014, Sydney, NSW, Australia. 8837:168–184.
Gadyatskaya O., Hansen R.R, Larsen K.G, Legay A., Olesen M.C, Poulsen D.B.  2016.  Modelling Attack-defense Trees Using Timed Automata. 14th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2016, Quebec, QC, Canada. 9884:35–50.
David N., David A., Hansen R.R, Larsen K.G, Legay A., Olesen M.C, Probst C.W.  2015.  Modelling Social-Technical Attacks with Timed Automata. Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Denver, Colorado, US. :21–28.
Ivanova M.G.  2016.  Modelling Socio-Technical Aspects of Organisational Security.
Ionita D., Koenen S.K, Wieringa R.J.  2014.  Modelling telecom fraud with e3value.