Publications

Export 7 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
Probst C.W, Hansen R.R.  2013.  Reachability-based impact as a measure for insiderness. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 4:38–48.
Pieters W., Lukszo Z., Hadziosmanović D., van den Berg J..  2014.  Reconciling Malicious and Accidental Risk in Cyber Security. Journal of Internet Services and Information Security. 4:4–26.
Bullee J.H, Montoya L., Pieters W., Junger M., Hartel P.H.  2015.  Regression Nodes: Extending attack trees with data from social sciences. Workshop on Socio-Technical Aspects in Security and Trust (STAST), Verona, Italy.
Lenin A..  2015.  Reliable and Efficient Determination of the Likelihood of Rational Attacks.
Guck D..  2017.  Reliable systems - Fault tree analysis via Markov reward automata.
Prakken H., Ionita D., Wieringa R.J.  2013.  Risk assessment as an argumentation game. 14th International Workshop on Computational Logic in Multi-Agent Systems, CLIMA XIV, Corunna, Spain. 8143:357–373.
Schaff G., Harpes C., Aubigny M., Junger M., Martin R..  2014.  RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences. Ninth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2014, Seville, Spain.