Export 137 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Schaff G., Harpes C., Aubigny M., Junger M., Martin R..  2014.  RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences. Ninth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2014, Seville, Spain.
Schaff G., Harpes C., Martin R., Junger M..  2013.  An application to estimate the cyber-risk detection skill of mobile device users (IDEA). Sixth International Conference on Advances in Human oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC), Venice, Italy. :Article7.
Schweitzer P.RJ.  2013.  Attack-Defense Trees.
Song L., Zhang L., Hermanns H., Godesken J.C.  2014.  Incremental Bisimulation Abstraction Refinement. ACM Transactions on Embedded Computing Systems (TECS). 13:ArtcleNo.142.
Stoelinga M.IA, Pieters W..  2013.  Attack navigator vindt en verhelpt zwakke plekken. Bits en chips. 4
Sytema M., Belinfante A.FE, Stoelinga M.IA, Marinelli L..  2014.  Experiences with formal engineering: model-based specification, implementation and testing of a software bus at Neopost. Science of computer programming. 80:188–209.
Timmer M., van de Pol J.C, Stoelinga M.IA.  2013.  Confluence reduction for Markov automata (extended version).
Timmer M., van de Pol J.C, Stoelinga M.IA.  2013.  Confluence Reduction for Markov Automata. Proceedings of the 11th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS), Buenos Aires, Argentina. 8053:243–257.
Uebelacker S., Quiel S..  2014.  The Social Engineering Personality Framework. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST), Vienna, Austria. :24–30.
Uebelacker S..  2013.  Security-aware organisational cultures as a starting point for mitigating socio-technical risks. Informatik 2013, University of Koblenz-Landau, Koblenz, Germany. P-220:2046–2057.
van der Wagen W., Pieters W..  2015.  From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks. British journal of Criminology. 55:1–18.
van Wieren M., Doerr C., Jacobs V., Pieters W..  2016.  Understanding Bifurcation of Slow Versus Fast Cyber-Attackers. 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Greece. 9963:19–33.