Publications

Export 7 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is E  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
Pieters W., Padget J., Dechesne F., Dignum V., Aldewereld H..  2014.  Effectiveness of qualitative and quantitative security obligations. Journal of Information Security and Applications. to appear:1–14.
Pieters W., Padget J., Dechesne F., Dignum V., Aldewereld H..  2015.  Effectiveness of qualitative and quantitative security obligations. Journal of Information Security and Applications. 22:3–16.
Jonkers H., Quartel D.AC.  2016.  Enterprise Architecture-Based Risk and Security Modelling and Analysis. Third International Workshop, GraMSec 2016, Lisbon, Portugal. 9987:94–101.
Hall P.A, Heath C.P, Coles-Kemp L., Tanner A..  2015.  Examining the Contribution of Critical Visualisation to Information Security. New Security Paradigm Workshop (NSPW), Twente, The Netherlands. :1–14.
Sytema M., Belinfante A.FE, Stoelinga M.IA, Marinelli L..  2014.  Experiences with formal engineering: model-based specification, implementation and testing of a software bus at Neopost. Science of computer programming. 80:188–209.
Dechesne F., Hadziosmanović D., Pieters W..  2014.  Experimenting with Incentives: Security in Pilots for Future Grids. IEEE Security & Privacy. 12:59–66.
Ivanova M.G, Probst C.W, Hansen R.R, Kammüller F..  2013.  Externalizing Behaviour for Analysing System Models. Journal of Internet Services and Information Security. 3:52–62.