Publications

Export 31 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
Conference Paper
Pieters W., Hadziosmanović D., Lenin A., Montoya L., Willemson J..  2014.  TREsPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis (Poster). 35th IEEE Symposium on Security and Privacy, San Jose, California.
Poskitt C., Dodds M., Paige R.F, Rensink A..  2014.  Towards Rigorously Faking Bidirectional Model Transformations. Proceedings of the Workshop on Analysis of Model Transformations, AMT 2014, Valencia, Spain. 1277:70–75.
Gadyatskaya O., Labunets K., Paci F..  2016.  Towards Empirical Evaluation of Automated Risk Assessment Methods. 11th International Conference on Risks and Security of Internet and Systems, CRiSIS 2016, Roscoff, France.
Ionita D., Wieringa R.J, Bullee J.H, Vasenev A..  2015.  Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group. 34th International Conference, ER 2015, Stockholm, Sweden. 9381:558–565.
Ionita D., Wieringa R.J, Bullee J.H, Vasenev A..  2015.  Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group. 34th International Conference, ER 2015, Stockholm, Sweden. 9381:558–565.
Jhawar R., Lounis K., Mauw S..  2016.  A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. 12th International Workshop on Security and Trust Management, STM 2016, Heraklion, Crete, Greece. 9871:138–153.
Alexandre D.E, Larsen K.G, Legay A., Mikučionis M..  2013.  Statistical Model Checking in Uppaal: Lets Practice. 1st Workshop on Statistical Model Checking, Rennes, France.
Alexandre D.E, Larsen K.G, Legay A., Mikučionis M..  2013.  Statistical Model Checking in Uppaal: Lets Practice. 1st Workshop on Statistical Model Checking, Rennes, France.
Prakken H., Ionita D., Wieringa R.J.  2013.  Risk assessment as an argumentation game. 14th International Workshop on Computational Logic in Multi-Agent Systems, CLIMA XIV, Corunna, Spain. 8143:357–373.
Buldas A., Lenin A..  2013.  New efficient utility upper bounds for the fully adaptive model of attack trees. 4th International Conference on Decision and Game Theory for Security (GameSec), Fort Worth, TX. 8252:192–205.
David N., David A., Hansen R.R, Larsen K.G, Legay A., Olesen M.C, Probst C.W.  2015.  Modelling Social-Technical Attacks with Timed Automata. Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Denver, Colorado, US. :21–28.
David N., David A., Hansen R.R, Larsen K.G, Legay A., Olesen M.C, Probst C.W.  2015.  Modelling Social-Technical Attacks with Timed Automata. Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Denver, Colorado, US. :21–28.
Gadyatskaya O., Hansen R.R, Larsen K.G, Legay A., Olesen M.C, Poulsen D.B.  2016.  Modelling Attack-defense Trees Using Timed Automata. 14th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2016, Quebec, QC, Canada. 9884:35–50.
Gadyatskaya O., Hansen R.R, Larsen K.G, Legay A., Olesen M.C, Poulsen D.B.  2016.  Modelling Attack-defense Trees Using Timed Automata. 14th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2016, Quebec, QC, Canada. 9884:35–50.
Benenson Z., Lenzini G., Oliveira D., Parkin S., Uebelacker S..  2015.  Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security. New Security Paradigm Workshop (NSPW), Twente, Netherlands. :1–15.
Lenin A., Buldas A..  2014.  Limiting Adversarial Budget in Quantitative Security Assessment. 5th International Conference on Decision and Game Theory for Security (GameSec), Los Angeles, CA, USA. 8840:155–174.
Lenin A., Willemson J., Charnamord A..  2015.  Genetic Approximations for the Failure-Free Security Games. Decision and Game Theory for Security, 6th International Conference, GameSec 2015, London, UK. 9406:311–321.
Li E., Barendse J., Brodbeck F., Tanner A..  2016.  From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation. Third International Workshop GraMSec 2016, Lisbon, Portugal. 9987:102–118.
Junges S., Guck D., Katoen J.P, Rensink A., Stoelinga M.IA.  2015.  Fault Trees on a Diet - Automated Reduction by Graph Rewriting. Proceedings of the First International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA 2015), Nanjing, China. 9409:3–18.
Junges S., Guck D., Katoen J.P, Rensink A., Stoelinga M.IA.  2015.  Fault Trees on a Diet - Automated Reduction by Graph Rewriting. Proceedings of the First International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA 2015), Nanjing, China. 9409:3–18.

Pages