Publications

Export 10 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L
Li E., Barendse J., Brodbeck F., Tanner A..  2016.  From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation. Third International Workshop GraMSec 2016, Lisbon, Portugal. 9987:102–118.
Lenzini G., Mauw S., Ouchani S..  2016.  Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. 12th International Workshop on Security and Trust Management, STM 2016, Heraklion, Crete, Greece. 9871:170–178.
Lenzini G., Mauw S., Ouchani S..  2015.  Security analysis of socio-technical physical systems. Computers & Electrical Engineering. online
Lenin A., Willemson J., Sari D..  2014.  Attacker profiling in quantitative security assessment based on attack trees. 19th Nordic Conference on Secure IT (NordSec), Troms?, Norway. 8788
Lenin A., Buldas A..  2014.  Limiting Adversarial Budget in Quantitative Security Assessment. 5th International Conference on Decision and Game Theory for Security (GameSec), Los Angeles, CA, USA. 8840:155–174.
Lenin A..  2015.  Reliable and Efficient Determination of the Likelihood of Rational Attacks.
Lenin A., Willemson J., Charnamord A..  2015.  Genetic Approximations for the Failure-Free Security Games. Decision and Game Theory for Security, 6th International Conference, GameSec 2015, London, UK. 9406:311–321.
Lastdrager E.EH.  2014.  Achieving a Consensual Definition of Phishing Based on a Systematic Review of the Literature. Crime Science. 3:9:1-9:16.
Lastdrager E.EH, Hartel P.H, Junger M..  2015.  Apate: Anti-Phishing Analysing and Triaging Environment (Poster). 36th IEEE Symposium on Security and Privacy, San Jose, CA, USA.
Lastdrager E.EH, Montoya L., Hartel P.H, Junger M..  2013.  Applying the Lost-Letter Technique to Assess IT Risk Behaviour. Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust, New Orleans, USA. :2–9.