Publications

Export 137 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
Schaff G., Harpes C., Aubigny M., Junger M., Martin R..  2014.  RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences. Ninth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2014, Seville, Spain.
S
Lenzini G., Mauw S., Ouchani S..  2015.  Security analysis of socio-technical physical systems. Computers & Electrical Engineering. online
Uebelacker S..  2013.  Security-aware organisational cultures as a starting point for mitigating socio-technical risks. Informatik 2013, University of Koblenz-Landau, Koblenz, Germany. P-220:2046–2057.
Pieters W., Hadziosmanović D., Dechesne F..  2015.  Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Science and Engineering Ethics. N/A
Pieters W., Hadziosmanović D., Dechesne F..  2016.  Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Science and Engineering Ethics. N/A
Arnold F., Guck D., Kumar R., Stoelinga M.IA.  2015.  Sequential and Parallel Attack Tree Modelling. Computer Safety, Reliability, and Security - Proceedings of the SAFECOM 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands. 9338:291–299.
Uebelacker S., Quiel S..  2014.  The Social Engineering Personality Framework. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST), Vienna, Austria. :24–30.
Gollmann D., Herley C., Koenig V., Pieters W., Sasse M.A.  2015.  Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports. 4:1–28.
Alexandre D.E, Larsen K.G, Legay A., Mikučionis M..  2013.  Statistical Model Checking in Uppaal: Lets Practice. 1st Workshop on Statistical Model Checking, Rennes, France.
Jhawar R., Lounis K., Mauw S..  2016.  A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. 12th International Workshop on Security and Trust Management, STM 2016, Heraklion, Crete, Greece. 9871:138–153.
Remke A.KI, Stoelinga M.IA.  2014.  Stochastic Model Checking: Rigorous Dependability Analysis Using Model Checking Techniques for Stochastic Systems. Lecture Notes in Computer Science. 8453
Ionita D., Kaidalova J., Vasenev A., Wieringa R.J.  2016.  A study on tangible participative enterprise modelling. ER 2016 Workshops AHA, MoBID, MORE-BI, MReBA, QMMQ, and WM2SP, Gifu, Japan, November 14-17, 2016, Proceedings, Gifu, Japan. 9975:139–148.
T
Ionita D., Wieringa R.J, Bullee J.H, Vasenev A..  2015.  Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group. 34th International Conference, ER 2015, Stockholm, Sweden. 9381:558–565.
Bullee J.H, Montoya L., Junger M., Hartel P.H.  2016.  Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention. Singapore Cyber Security R&D Conference (SG-CRC), Singapore, Singapore. 1:1–6.
Pieters W..  2013.  On thinging things and serving services: technological mediation and inseparable goods. Ethics and information technology. 15:195–208.
Feng Y., Zhang L..  2013.  A tighter bound for the self-stabilization time in Herman's algorithm. Information processing letters. 113:486–488.
Kumar R., Guck D., Stoelinga M.IA.  2015.  Time dependent analysis with dynamic counter measure trees. Proceedings of the 13th Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2015), London, England.
Arnold F., Hermanns H., Pulungan R., Stoelinga M.IA.  2014.  Time-dependent analysis of attacks. Proceedings of the Third International Conference on Principles and Security of Trust, POST 2014, Grenoble, France. 8414:285–305.
Nidd M., Ivanova M.G, Probst C.W, Tanner A..  2015.  Tool-based Risk Assessment of Cloud Infrastructures as Socio-Technical Systems. The Cloud Security Ecosystem. :495–517.
Gadyatskaya O., Labunets K., Paci F..  2016.  Towards Empirical Evaluation of Automated Risk Assessment Methods. 11th International Conference on Risks and Security of Internet and Systems, CRiSIS 2016, Roscoff, France.
Kammüller F., Kerber M., Probst C.W.  2016.  Towards Formal Analysis of Insider Threats for Auctions. Proceedings of the 2016 International Workshop on Managing Insider Security Threats, Vienna, Austria. :23–34.
Poskitt C., Dodds M., Paige R.F, Rensink A..  2014.  Towards Rigorously Faking Bidirectional Model Transformations. Proceedings of the Workshop on Analysis of Model Transformations, AMT 2014, Valencia, Spain. 1277:70–75.
Ivanova M.G, Probst C.W, Hansen R.R, Kammueller F..  2015.  Transforming Graphical System Models To Graphical Attack Models. The Second International Workshop on Graphical Models for Security (GraMSec 2015), Verona, Italy. :1–15.
Coles-Kemp L., Hall P..  2016.  TREsPASS Book 1: Picturing Risk.
Coles-Kemp L., Hall P..  2016.  TREsPASS Book 2: Summer School.

Pages