Publications

Export 137 results:
[ Author(Asc)] Title Type Year
Filters: Filter is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
V
van Wieren M., Doerr C., Jacobs V., Pieters W..  2016.  Understanding Bifurcation of Slow Versus Fast Cyber-Attackers. 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Greece. 9963:19–33.
van der Wagen W., Pieters W..  2015.  From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks. British journal of Criminology. 55:1–18.
U
Uebelacker S..  2013.  Security-aware organisational cultures as a starting point for mitigating socio-technical risks. Informatik 2013, University of Koblenz-Landau, Koblenz, Germany. P-220:2046–2057.
Uebelacker S., Quiel S..  2014.  The Social Engineering Personality Framework. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST), Vienna, Austria. :24–30.
T
Timmer M., van de Pol J.C, Stoelinga M.IA.  2013.  Confluence reduction for Markov automata (extended version).
Timmer M., van de Pol J.C, Stoelinga M.IA.  2013.  Confluence Reduction for Markov Automata. Proceedings of the 11th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS), Buenos Aires, Argentina. 8053:243–257.
S
Sytema M., Belinfante A.FE, Stoelinga M.IA, Marinelli L..  2014.  Experiences with formal engineering: model-based specification, implementation and testing of a software bus at Neopost. Science of computer programming. 80:188–209.
Stoelinga M.IA, Pieters W..  2013.  Attack navigator vindt en verhelpt zwakke plekken. Bits en chips. 4
Song L., Zhang L., Hermanns H., Godesken J.C.  2014.  Incremental Bisimulation Abstraction Refinement. ACM Transactions on Embedded Computing Systems (TECS). 13:ArtcleNo.142.
Schweitzer P.RJ.  2013.  Attack-Defense Trees.
Schaff G., Harpes C., Aubigny M., Junger M., Martin R..  2014.  RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences. Ninth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2014, Seville, Spain.
Schaff G., Harpes C., Martin R., Junger M..  2013.  An application to estimate the cyber-risk detection skill of mobile device users (IDEA). Sixth International Conference on Advances in Human oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC), Venice, Italy. :Article7.
D. Sari P.  2014.  Attacker Profiling in Quantitative Security Assessment.
R
Ruijters E.JJ, Schivo S., Stoelinga M.IA, Rensink A..  2017.  Uniform analysis of fault trees through model transformations. Proceedings of the 63rd Annual Reliabliity and Maintainability Symposium (RAMS 2017), Orlando, FL, USA.
Ruijters E.JJ, Guck D., Drolenga P., Peters M., Stoelinga M.IA.  2016.  Maintenance analysis and optimization via statistical model checking: Evaluating a train pneumatic compressor. Proceedings of the 13th International Conference on Quantitative Evaluation of SysTems, QEST 2016, Québec City, Canada. 9826
Remke A.KI, Stoelinga M.IA.  2014.  Stochastic Model Checking: Rigorous Dependability Analysis Using Model Checking Techniques for Stochastic Systems. Lecture Notes in Computer Science. 8453
P
Probst C.W, Hansen R.R.  2014.  Model-based Abstraction of Data Provenance. 6th USENIX Workshop on the Theory and Practice of Provenance, Cologne, Germany. :Article3.
Probst C.W, Kammüller F., R. Hansen R.  2015.  Formal Modelling and Analysis of Socio-Technical Systems. Semantics, Logics, and Calculi: Essays Dedicated to Hanne Riis Nielson and Flemming Nielson on the Occasion of Their 60th Birthdays. 9560:54–73.
Probst C.W, Willemson J., Pieters W..  2016.  The Attack Navigator (Invited). Graphical Models for Security - Revised Selected Papers. 9390:1–17.
Probst C.W, Hansen R.R.  2013.  Reachability-based impact as a measure for insiderness. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 4:38–48.
Prakken H., Ionita D., Wieringa R.J.  2013.  Risk assessment as an argumentation game. 14th International Workshop on Computational Logic in Multi-Agent Systems, CLIMA XIV, Corunna, Spain. 8143:357–373.
Poskitt C., Dodds M., Paige R.F, Rensink A..  2014.  Towards Rigorously Faking Bidirectional Model Transformations. Proceedings of the Workshop on Analysis of Model Transformations, AMT 2014, Valencia, Spain. 1277:70–75.
Pieters W..  2013.  On thinging things and serving services: technological mediation and inseparable goods. Ethics and information technology. 15:195–208.
Pieters W., Hadziosmanović D., Dechesne F..  2016.  Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Science and Engineering Ethics. N/A
Pieters W., Barendse J., Ford M., Heath C.PR, Probst C.W, Verbij R..  2016.  The Navigation Metaphor in Security Economics. IEEE Security & Privacy. 14:14–21.

Pages