Publications

Export 9 results:
Author Title [ Type(Desc)] Year
Filters: Author is F. Kammüller  [Clear All Filters]
Book Chapter
Probst C.W, Kammüller F., R. Hansen R.  2015.  Formal Modelling and Analysis of Socio-Technical Systems. Semantics, Logics, and Calculi: Essays Dedicated to Hanne Riis Nielson and Flemming Nielson on the Occasion of Their 60th Birthdays. 9560:54–73.
Conference Paper
Kammüller F., Probst C.W.  2014.  Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis. IEEE Security and Privacy Workshops (SPW), San Jose, California. :229–235.
Kammüller F., Probst C.W.  2013.  Invalidating policies using structural information. IEEE Security and Privacy Workshops (SPW 2013), San Francisco, CA. :76–81.
Boender J., Ivanova M.G, Kammüller F., Primierio G..  2014.  Modeling Human Behaviour with Higher Order Logic: Insider Threats. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST), Vienna, Austria. :31–39.
Kammüller F., Kerber M., Probst C.W.  2016.  Towards Formal Analysis of Insider Threats for Auctions. Proceedings of the 2016 International Workshop on Managing Insider Security Threats, Vienna, Austria. :23–34.
Journal Article
Ivanova M.G, Probst C.W, Hansen R.R, Kammüller F..  2013.  Externalizing Behaviour for Analysing System Models. Journal of Internet Services and Information Security. 3:52–62.
Kammüller F., Probst C.W.  2014.  Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). 5:59–79.
Kammüller F., Probst C.W.  2015.  Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal. 99:1–12.
Kammüller F., Probst C.W.  2016.  Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal.