Publications

Export 137 results:
Author Title Type [ Year(Desc)]
2013
Kordy B., Kordy P., Mauw S., Schweitzer P..  2013.  ADTool: Security Analysis with Attack-Defense Trees. 10th International Conference on Quantitative Evaluation of Systems (QEST), Buenos Aires, Argentina. 8054:173–176.
Schaff G., Harpes C., Martin R., Junger M..  2013.  An application to estimate the cyber-risk detection skill of mobile device users (IDEA). Sixth International Conference on Advances in Human oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC), Venice, Italy. :Article7.
Lastdrager E.EH, Montoya L., Hartel P.H, Junger M..  2013.  Applying the Lost-Letter Technique to Assess IT Risk Behaviour. Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust, New Orleans, USA. :2–9.
Stoelinga M.IA, Pieters W..  2013.  Attack navigator vindt en verhelpt zwakke plekken. Bits en chips. 4
Schweitzer P.RJ.  2013.  Attack-Defense Trees.
Timmer M., van de Pol J.C, Stoelinga M.IA.  2013.  Confluence Reduction for Markov Automata. Proceedings of the 11th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS), Buenos Aires, Argentina. 8053:243–257.
Timmer M., van de Pol J.C, Stoelinga M.IA.  2013.  Confluence reduction for Markov automata (extended version).
Ionita D., Hartel P.H, Pieters W., Wieringa R.J.  2013.  Current established risk assessment methodologies and tools.
Eisentraut C., Hermanns H., Krämer J.P, Turini A., Zhang L..  2013.  Deciding Bisimilarities on Distributions. 10th International Conference on Quantitative Evaluation of Systems (QEST), Buenos Aires, Argentina. 8054:72–88.
Bleikertz S., Mastelic T., Pape S., Pieters W., Dimkov T..  2013.  Defining the cloud battlefield - supporting security assessments by cloud customers. International Conference on Cloud Engineering (IC2E 2013), Redwood City, CA. :78–87.
Pieters W..  2013.  Defining "The Weakest Link" Comparative Security in Complex Systems of Systems. 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, CloudCom, Bristol, United Kingdom. :39–44.
Arnold F., Belinfante A.FE, Van der Berg F.I, Guck D., Stoelinga M.IA.  2013.  DFTCalc: a tool for efficient fault tree analysis. Proceedings of the 32nd International Conference on Computer Safety, Reliability, and Security (SAFECOMP), Toulouse, France. 8153:293–301.
Arnold F., Belinfante A.FE, Van der Berg F.I, Guck D., Stoelinga M.IA.  2013.  DFTCalc: a tool for efficient fault tree analysis (extended version).
Ivanova M.G, Probst C.W, Hansen R.R, Kammüller F..  2013.  Externalizing Behaviour for Analysing System Models. Journal of Internet Services and Information Security. 3:52–62.
Kammüller F., Probst C.W.  2013.  Invalidating policies using structural information. IEEE Security and Privacy Workshops (SPW 2013), San Francisco, CA. :76–81.
Buldas A., Lenin A..  2013.  New efficient utility upper bounds for the fully adaptive model of attack trees. 4th International Conference on Decision and Game Theory for Security (GameSec), Fort Worth, TX. 8252:192–205.
Pieters W., Padget J., Dechesne F., Dignum V., Aldewereld H..  2013.  Obligations to enforce prohibitions: on the adequacy of security policies. SIN '13 - Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey. :54–61.
Arnold F., Pieters W., Stoelinga M.IA.  2013.  Quantitative penetration testing with item response theory. 9th International Conference on Information Assurance and Security, IAS 2013, Gammarth, Tunisia. :49–54.
Arnold F., Pieters W., Stoelinga M.IA.  2013.  Quantitative penetration testing with item response theory (extended version).
Eisentraut C.W, Hermanns H., Schuster J., Turini A., Zhang L..  2013.  The Quest for Minimal Quotients for Probabilistic Automata. 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Rome, Italy. 7795:16–31.
Probst C.W, Hansen R.R.  2013.  Reachability-based impact as a measure for insiderness. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 4:38–48.
Prakken H., Ionita D., Wieringa R.J.  2013.  Risk assessment as an argumentation game. 14th International Workshop on Computational Logic in Multi-Agent Systems, CLIMA XIV, Corunna, Spain. 8143:357–373.
Uebelacker S..  2013.  Security-aware organisational cultures as a starting point for mitigating socio-technical risks. Informatik 2013, University of Koblenz-Landau, Koblenz, Germany. P-220:2046–2057.
Alexandre D.E, Larsen K.G, Legay A., Mikučionis M..  2013.  Statistical Model Checking in Uppaal: Lets Practice. 1st Workshop on Statistical Model Checking, Rennes, France.
Pieters W..  2013.  On thinging things and serving services: technological mediation and inseparable goods. Ethics and information technology. 15:195–208.

Pages