Publications

Export 8 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
J
Junges S., Guck D., Katoen J.P, Rensink A., Stoelinga M.IA.  2017.  Fault trees on a diet: automated reduction by graph rewriting. Formal Aspects of Computing. online pre-publication:1–53.
Junges S., Guck D., Katoen J.P, Rensink A., Stoelinga M.IA.  2015.  Fault Trees on a Diet - Automated Reduction by Graph Rewriting. Proceedings of the First International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA 2015), Nanjing, China. 9409:3–18.
Junges S., Guck D., Katoen J.P, Stoelinga M.IA.  2016.  Uncovering dynamic fault trees. Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), Toulouse, France. :299–310.
Junger M., Morales A.LMontoya, Overink F.J.  2017.  Priming and warnings are not effective to prevent social engineering attacks. Computers in Human Behavior. 66:75–87.
Jonkers H., Quartel D.AC.  2016.  Enterprise Architecture-Based Risk and Security Modelling and Analysis. Third International Workshop, GraMSec 2016, Lisbon, Portugal. 9987:94–101.
Jhawar R., Mauw S., Zakiuddin I..  2016.  Automating Cyber Defence Responses Using Attack-Defence Trees and Game Theory. European Conference on Cyber Warfare and Security, ECCWS 2016, Munich, Germany. :163–172.
Jhawar R., Lounis K., Mauw S..  2016.  A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. 12th International Workshop on Security and Trust Management, STM 2016, Heraklion, Crete, Greece. 9871:138–153.
Jhawar R., Kordy B., Mauw S., Radomirović S., Trujillo-Rasua R..  2015.  Attack Trees with Sequential Conjunction. International Conference on ICT Systems Security and Privacy Protection (IFIPSEC), Hamburg, Germany.