Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security

Filter
Article in proceeding

Search results

  • Article in proceeding

    Attack Tree Generation by Policy Invalidation

    Ivanova, M. G., Probst, C., Hansen, R. R. & Kammüller, F., 2015, Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings. Akram, R. N. & Jajodia, S. (eds.). Springer, p. 249-259 (Lecture Notes in Computer Science; No. 9311).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    17 Citations (Scopus)
  • Modelling Socio-Technical Attacks with Timed Automata

    David, N., David, A., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C. & Probst, C., 2015, Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats. Association for Computing Machinery, p. 21-28 7 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    14 Citations (Scopus)
  • The Timed Decentralised Label Model

    Pedersen, M. L., Sørensen, M. H., Lux, D., Nyman, U. M. & Hansen, R. R., 2015, Secure IT Systems: 20th Nordic Conference on Secure IT-Systems (NordSec 2015). Buchegger, S. & Dam, M. (eds.). Springer, p. 27-43 (Lecture Notes in Computer Science; No. 9417).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    2 Citations (Scopus)
    458 Downloads (Pure)