Publications

Export 8 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
J
Junges S., Guck D., Katoen J.P, Rensink A., Stoelinga M.IA.  2017.  Fault trees on a diet: automated reduction by graph rewriting. Formal Aspects of Computing. online pre-publication:1–53.
Junges S., Guck D., Katoen J.P, Rensink A., Stoelinga M.IA.  2015.  Fault Trees on a Diet - Automated Reduction by Graph Rewriting. Proceedings of the First International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA 2015), Nanjing, China. 9409:3–18.
Junges S., Guck D., Katoen J.P, Stoelinga M.IA.  2016.  Uncovering dynamic fault trees. Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), Toulouse, France. :299–310.
Junger M., Morales A.LMontoya, Overink F.J.  2017.  Priming and warnings are not effective to prevent social engineering attacks. Computers in Human Behavior. 66:75–87.
Jonkers H., Quartel D.AC.  2016.  Enterprise Architecture-Based Risk and Security Modelling and Analysis. Third International Workshop, GraMSec 2016, Lisbon, Portugal. 9987:94–101.
Jhawar R., Lounis K., Mauw S..  2016.  A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. 12th International Workshop on Security and Trust Management, STM 2016, Heraklion, Crete, Greece. 9871:138–153.
Jhawar R., Kordy B., Mauw S., Radomirović S., Trujillo-Rasua R..  2015.  Attack Trees with Sequential Conjunction. International Conference on ICT Systems Security and Privacy Protection (IFIPSEC), Hamburg, Germany.
Jhawar R., Mauw S., Zakiuddin I..  2016.  Automating Cyber Defence Responses Using Attack-Defence Trees and Game Theory. European Conference on Cyber Warfare and Security, ECCWS 2016, Munich, Germany. :163–172.