Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security

Filter
Konferenceartikel i proceeding

Søgeresultater

  • Konferenceartikel i proceeding

    Attack Tree Generation by Policy Invalidation

    Ivanova, M. G., Probst, C., Hansen, R. R. & Kammüller, F., 2015, Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings. Akram, R. N. & Jajodia, S. (red.). Springer, s. 249-259 (Lecture Notes in Computer Science; Nr. 9311).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    17 Citationer (Scopus)
  • Modelling Socio-Technical Attacks with Timed Automata

    David, N., David, A., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C. & Probst, C., 2015, Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats. Association for Computing Machinery, s. 21-28 7 s.

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    14 Citationer (Scopus)
  • The Timed Decentralised Label Model

    Pedersen, M. L., Sørensen, M. H., Lux, D., Nyman, U. M. & Hansen, R. R., 2015, Secure IT Systems: 20th Nordic Conference on Secure IT-Systems (NordSec 2015). Buchegger, S. & Dam, M. (red.). Springer, s. 27-43 (Lecture Notes in Computer Science; Nr. 9417).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    Åben adgang
    Fil
    2 Citationer (Scopus)
    458 Downloads (Pure)