Photo of Axel Bernard E Legay
  • Selma Lagerløfs Vej 300, 1-2-13

    9220 Aalborg Ø

    Denmark

  • Selma Lagerlöfs Vej 300, Cassiopeia

    9220 Aalborg

    Denmark

20152021
If you made any changes in Pure these will be visible here soon.

Research Output 2015 2019

  • 9 Article in proceeding
  • 1 Journal article
Filter
Article in proceeding
2019

Teaching Stratego to Play Ball: Optimal Synthesis for Continuous Space MDPs

Jaeger, M., Jensen, P. G., Larsen, K. G., Legay, A. B. E., Sedwards, S. & Taankvist, J. H., 28 Oct 2019, Automated Technology for Verification and Analysis- 17th International Symposium, AVTA 2019, Proceedings: ATVA 2019: Automated Technology for Verification and Analysis. Chen, Y-F., Cheng, C-H. & Esparza, J. (eds.). Springer, p. 81-97 17 p. (Lecture Notes in Computer Science, Vol. 11781).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

Reinforcement learning
Teaching
Controllers
Cyber Physical System
2018
1 Citation (Scopus)
209 Downloads (Pure)

Integrating Tools: Co-simulation in UPPAAL Using FMI-FMU

Nyman, U., Jensen, P. G., Larsen, K. G. & Legay, A., 15 Feb 2018, 22nd International Conference on Engineering of Complex Computer Systems, ICECCS 2017, Fukuoka, Japan, November 5-8, 2017. IEEE, p. 11-19 9 p.

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

Open Access
File
Acoustic waves
Controllers
2017
4 Citations (Scopus)

Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata

Hansen, R. R., Jensen, P. G., Larsen, K. G., Legay, A. & Poulsen, D. B., 2017, Graphical Models for Security: 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers. Springer, p. 75-90 (Lecture Notes in Computer Science).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

Open Access
2016
3 Citations (Scopus)

A Model-Based Framework for the Specification and Analysis of Hierarchical Scheduling Systems

Chadli, M., Kim, J. H., Legay, A., Traonouez, L. M., Naujokat, S., Bernhard, S. & Larsen, K. G., 2016, Critical Systems: Formal Methods and Automated Verification. Springer, p. 133–141 (Lecture Notes in Computer Science, Vol. 9933).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

5 Citations (Scopus)
129 Downloads (Pure)

Importance Sampling for Stochastic Timed Automata

Jegourel, C., Larsen, K. G., Legay, A., Mikučionis, M., Poulsen, D. B. & Sedwards, S., 2016, Dependable Software Engineering: Theories, Tools, and Applications. Fränzle, M., Kapur, D. & Zhan, N. (eds.). Springer, p. 163-178 16 p. (Lecture Notes in Computer Science, Vol. 9984).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

File
Importance sampling
20 Citations (Scopus)

Modelling Attack-defense Trees Using Timed Automata

Gadyatskaya, O., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C. & Poulsen, D. B., 2016, Formal Modeling and Analysis of Timed Systems. Springer, p. 35-50 (Lecture Notes in Computer Science, Vol. 9884).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

9 Citations (Scopus)

On the Power of Statistical Model Checking

Larsen, K. G. & Legay, A., 2016, Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications. Springer, p. 843–862 (Lecture Notes in Computer Science, Vol. 9953).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

14 Citations (Scopus)

Statistical Model Checking: Past, Present, and Future

Larsen, K. G. & Legay, A., 2016, Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques. Springer, p. 3–15 (Lecture Notes in Computer Science, Vol. 9952).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

2015
9 Citations (Scopus)

Modelling Socio-Technical Attacks with Timed Automata

David, N., David, A., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C. & Probst, C., 2015, Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats. Association for Computing Machinery, p. 21-28 7 p.

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review