Export 137 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Ionita D., Gordijn J., Yesuf A.S, Wieringa R.J.  2016.  Value-Driven Risk Analysis of Coordination Models. 9th IFIP WG 8.1. Working Conference, PoEM 2015, Proceedings, Skovde, Sweden. 267:102–116.
Hermanns H., Krämer J., Krčál J., Stoelinga M.IA.  2016.  The Value of Attack-Defence Diagrams. Proceedings of the 5th International Conference on Principles of Security and Trust, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, Netherlands. 9635:163–185.
Ionita D., Wieringa R.J, Wolos L., Gordijn J., Pieters W..  2015.  Using Value Models for Business Risk Analysis in e-Service Networks. 8th IFIP WG 8.1. Working Conference, PoEM 2015, Valencia, Spain. 235:239–253.
Fraile M., Ford M., Gadyatskaya O., Kumar R., Stoelinga M.IA, Trujillo-Rasua R..  2016.  Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study. 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling (PoEM), Skövde, Sweden. 267:326–334.
Ruijters E.JJ, Schivo S., Stoelinga M.IA, Rensink A..  2017.  Uniform analysis of fault trees through model transformations. Proceedings of the 63rd Annual Reliabliity and Maintainability Symposium (RAMS 2017), Orlando, FL, USA.
Gu M., Aslanyan Z., Probst C.W.  2016.  Understanding How Components of Organisations Contribute to Attacks. 21st Nordic Conference, NordSec 2016, Oulu, Finland. 10014:54–66.
van Wieren M., Doerr C., Jacobs V., Pieters W..  2016.  Understanding Bifurcation of Slow Versus Fast Cyber-Attackers. 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Greece. 9963:19–33.
Junges S., Guck D., Katoen J.P, Stoelinga M.IA.  2016.  Uncovering dynamic fault trees. Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), Toulouse, France. :299–310.
Arnold F., Gebler D., Guck D., Hatefi H..  2014.  A tutorial on interactive Markov chains. Stochastic Model Checking. Rigorous Dependability Analysis Using Model Checking Techniques for Stochastic Systems, Vahrn, Italy. 8453:26–66.
Montoya L..  2013.  The TREsPASS project. ICTOpen2013, Eindhoven. :1–1.
Pieters W., Hadziosmanović D., Lenin A., Montoya L., Willemson J..  2014.  TREsPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis (Poster). 35th IEEE Symposium on Security and Privacy, San Jose, California.
Coles-Kemp L., Hall P..  2016.  TREsPASS Book 3: Creative Engagements.
Coles-Kemp L., Hall P..  2016.  TREsPASS Book 2: Summer School.
Coles-Kemp L., Hall P..  2016.  TREsPASS Book 1: Picturing Risk.
Ivanova M.G, Probst C.W, Hansen R.R, Kammueller F..  2015.  Transforming Graphical System Models To Graphical Attack Models. The Second International Workshop on Graphical Models for Security (GraMSec 2015), Verona, Italy. :1–15.
Poskitt C., Dodds M., Paige R.F, Rensink A..  2014.  Towards Rigorously Faking Bidirectional Model Transformations. Proceedings of the Workshop on Analysis of Model Transformations, AMT 2014, Valencia, Spain. 1277:70–75.
Kammüller F., Kerber M., Probst C.W.  2016.  Towards Formal Analysis of Insider Threats for Auctions. Proceedings of the 2016 International Workshop on Managing Insider Security Threats, Vienna, Austria. :23–34.
Gadyatskaya O., Labunets K., Paci F..  2016.  Towards Empirical Evaluation of Automated Risk Assessment Methods. 11th International Conference on Risks and Security of Internet and Systems, CRiSIS 2016, Roscoff, France.
Nidd M., Ivanova M.G, Probst C.W, Tanner A..  2015.  Tool-based Risk Assessment of Cloud Infrastructures as Socio-Technical Systems. The Cloud Security Ecosystem. :495–517.
Arnold F., Hermanns H., Pulungan R., Stoelinga M.IA.  2014.  Time-dependent analysis of attacks. Proceedings of the Third International Conference on Principles and Security of Trust, POST 2014, Grenoble, France. 8414:285–305.
Kumar R., Guck D., Stoelinga M.IA.  2015.  Time dependent analysis with dynamic counter measure trees. Proceedings of the 13th Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2015), London, England.
Feng Y., Zhang L..  2013.  A tighter bound for the self-stabilization time in Herman's algorithm. Information processing letters. 113:486–488.
Pieters W..  2013.  On thinging things and serving services: technological mediation and inseparable goods. Ethics and information technology. 15:195–208.
Bullee J.H, Montoya L., Junger M., Hartel P.H.  2016.  Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention. Singapore Cyber Security R&D Conference (SG-CRC), Singapore, Singapore. 1:1–6.
Ionita D., Wieringa R.J, Bullee J.H, Vasenev A..  2015.  Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group. 34th International Conference, ER 2015, Stockholm, Sweden. 9381:558–565.