Publications

Export 137 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Kammüller F., Probst C.W.  2015.  Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal. 99:1–12.
Kammüller F., Probst C.W.  2013.  Invalidating policies using structural information. IEEE Security and Privacy Workshops (SPW 2013), San Francisco, CA. :76–81.
Kammüller F., Probst C.W.  2016.  Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal.
Kammüller F., Probst C.W.  2014.  Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). 5:59–79.
Kordy B., Mauw S., Pieters W..  2014.  Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014. EPTCS. 148
Kordy B., Kordy P., Mauw S., Schweitzer P..  2013.  ADTool: Security Analysis with Attack-Defense Trees. 10th International Conference on Quantitative Evaluation of Systems (QEST), Buenos Aires, Argentina. 8054:173–176.
Kordy B., Pouly M., Schweizer P..  2014.  A Probabilistic Framework for Security Scenarios with Dependent Actions. 11th International Conference on Integrated Formal Methods, IFM 2014, Bertinoro, Italy. 8739:256–271.
Kordy B., Pouly M., Schweitzer P..  2016.  Probabilistic reasoning with graphical security models. Information sciences. 342:111–131.
Kordy B.K, Piètre-Cambacédès L., Schweitzer P..  2014.  DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees. Computer Science Review. 13-14:1–38.
Kordy B.K, Piètre-Cambacédès L., Schweitzer P..  2015.  DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees. Computer Science Review. 13-14:1–38.
Kumar R., Stoelinga M.IA.  2017.  Quantitative security and safety analysis with attack-fault trees. Proceeding of the 18th IEEE International Symposium on High Assurance Systems Engineering, Singapore.
Kumar R., Guck D., Stoelinga M.IA.  2015.  Time dependent analysis with dynamic counter measure trees. Proceedings of the 13th Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2015), London, England.
Kumar R., Ruijters E.JJ, Stoelinga M.IA.  2015.  Quantitative Attack Tree Analysis via Priced Timed Automata. Proceedings of the 13th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2015, Madrid, Spain. 9268:156–171.
L
Lastdrager E.EH, Hartel P.H, Junger M..  2015.  Apate: Anti-Phishing Analysing and Triaging Environment (Poster). 36th IEEE Symposium on Security and Privacy, San Jose, CA, USA.
Lastdrager E.EH.  2014.  Achieving a Consensual Definition of Phishing Based on a Systematic Review of the Literature. Crime Science. 3:9:1-9:16.
Lastdrager E.EH, Montoya L., Hartel P.H, Junger M..  2013.  Applying the Lost-Letter Technique to Assess IT Risk Behaviour. Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust, New Orleans, USA. :2–9.
Lenin A., Buldas A..  2014.  Limiting Adversarial Budget in Quantitative Security Assessment. 5th International Conference on Decision and Game Theory for Security (GameSec), Los Angeles, CA, USA. 8840:155–174.
Lenin A., Willemson J., Charnamord A..  2015.  Genetic Approximations for the Failure-Free Security Games. Decision and Game Theory for Security, 6th International Conference, GameSec 2015, London, UK. 9406:311–321.
Lenin A., Willemson J., Sari D..  2014.  Attacker profiling in quantitative security assessment based on attack trees. 19th Nordic Conference on Secure IT (NordSec), Troms?, Norway. 8788
Lenin A..  2015.  Reliable and Efficient Determination of the Likelihood of Rational Attacks.
Lenzini G., Mauw S., Ouchani S..  2016.  Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. 12th International Workshop on Security and Trust Management, STM 2016, Heraklion, Crete, Greece. 9871:170–178.
Lenzini G., Mauw S., Ouchani S..  2015.  Security analysis of socio-technical physical systems. Computers & Electrical Engineering. online
Li E., Barendse J., Brodbeck F., Tanner A..  2016.  From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation. Third International Workshop GraMSec 2016, Lisbon, Portugal. 9987:102–118.
M
Montoya L..  2013.  The TREsPASS project. ICTOpen2013, Eindhoven. :1–1.

Pages