-
1
-
-
77956341661
-
The emergence of intelligent enterprises: From CPS to CPSS
-
F.-Y. Wang, "The emergence of intelligent enterprises: From CPS to CPSS," IEEE Intelligent Systems, vol. 25, no. 4, pp. 85-88, 2010.
-
(2010)
IEEE Intelligent Systems
, vol.25
, Issue.4
, pp. 85-88
-
-
Wang, F.-Y.1
-
2
-
-
85025621702
-
10341 Report - Insider threats: Strategies for prevention, mitigation, and response
-
no. 10341. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany
-
M. Bishop, L. Coles-Kemp, D. Gollmann, J. Hunker, and C. Probst, "10341 Report - Insider threats: Strategies for prevention, mitigation, and response," in Insider Threats: Strategies for Prevention, Mitigation, and Response, Dagstuhl Seminar Proceedings, no. 10341. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, 2010.
-
(2010)
Insider Threats: Strategies For Prevention, Mitigation, and Response, Dagstuhl Seminar Proceedings
-
-
Bishop, M.1
Coles-Kemp, L.2
Gollmann, D.3
Hunker, J.4
Probst, C.5
-
3
-
-
57649097309
-
An extensible analysable system model
-
C. Probst and R. Hansen, "An extensible analysable system model," Information security technical report, vol. 13, no. 4, pp. 235-246, 2008.
-
(2008)
Information Security Technical Report
, vol.13
, Issue.4
, pp. 235-246
-
-
Probst, C.1
Hansen, R.2
-
4
-
-
78449295810
-
Portunes: Representing attack scenarios spanning through the physical, digital and social domain
-
Revised Selected Papers, Paphos, Cyprus, LNCS, Springer-Verlag, March
-
T. Dimkov, W. Pieters, and P. Hartel, "Portunes: representing attack scenarios spanning through the physical, digital and social domain," in Proc. of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10). Revised Selected Papers, Paphos, Cyprus, LNCS, vol. 6186. Springer-Verlag, March 2010, pp. 112-129.
-
(2010)
Proc. of the Joint Workshop On Automated Reasoning For Security Protocol Analysis and Issues In the Theory of Security (ARSPA-WITS'10)
, vol.6186
, pp. 112-129
-
-
Dimkov, T.1
Pieters, W.2
Hartel, P.3
-
5
-
-
78751537277
-
Two methodologies for physical penetration testing using social engineering
-
Austin, Texas, USA. ACM Press, December
-
T. Dimkov and W. Pieters and P.H. Hartel, "Two methodologies for physical penetration testing using social engineering," in Proc. of the Annual Computer Security Applications Conference (ACSAC'10), Austin, Texas, USA. ACM Press, December 2010, pp. 399-408.
-
(2010)
Proc. of the Annual Computer Security Applications Conference (ACSAC'10)
, pp. 399-408
-
-
Dimkov, T.1
Pieters, W.2
Hartel, P.H.3
-
7
-
-
48949088211
-
The Scyther Tool: Verification, falsification, and analysis of security protocols
-
Princeton, USA, LNCS, Springer-Verlag, July
-
C. Cremers, "The Scyther Tool: Verification, falsification, and analysis of security protocols," in Proc. of the 20th International Conference on Computer Aided Verification (CAV'08), Princeton, USA, LNCS, vol. 5123. Springer-Verlag, July 2008, pp. 414-418.
-
(2008)
Proc. of the 20th International Conference On Computer Aided Verification (CAV'08)
, vol.5123
, pp. 414-418
-
-
Cremers, C.1
-
8
-
-
84885582667
-
On the inability of existing security models to cope with data mobility in dynamic organizations
-
University of Twente, Tech. Rep, TR-CTIT-08-57
-
T. Dimkov, Q. Tang, and P. Hartel, "On the inability of existing security models to cope with data mobility in dynamic organizations," Centre for Telematics and Information Technology, University of Twente, Tech. Rep. TR-CTIT-08-57, 2008.
-
(2008)
Centre For Telematics and Information Technology
-
-
Dimkov, T.1
Tang, Q.2
Hartel, P.3
-
9
-
-
84868569926
-
-
Centre for Telematics and Information Technology, University of Twente, Enschede, Technical Report TR-CTIT-10-34, October
-
P. Hartel, M. Junger, and R. Wieringa, "Cyber-crime science = crime science + information security," http://eprints.eemcs.utwente.nl/18500/, Centre for Telematics and Information Technology, University of Twente, Enschede, Technical Report TR-CTIT-10-34, October 2010.
-
(2010)
Cyber-crime Science = Crime Science + Information Security
-
-
Hartel, P.1
Junger, M.2
Wieringa, R.3
-
11
-
-
84886942861
-
-
[Online]. Available
-
Jericho Forum, "Jericho whitepaper," 2005. [Online]. Available: http://www.opengroup.org/projects/jericho/uploads/40/6809/visionwp.pdf
-
(2005)
Jericho Whitepaper
-
-
Forum, J.1
-
13
-
-
29144523383
-
Information exposure control through data manipulation for ubiquitous computing
-
Nova Scotia, Canada. ACM Press, September
-
B. Dragovic and J. Crowcroft, "Information exposure control through data manipulation for ubiquitous computing," in Proc. of the 2004 Workshop on New Security Paradigms (NSPW'04), Nova Scotia, Canada. ACM Press, September 2004, pp. 57-64.
-
(2004)
Proc. of the 2004 Workshop On New Security Paradigms (NSPW'04)
, pp. 57-64
-
-
Dragovic, B.1
Crowcroft, J.2
-
15
-
-
72949101002
-
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients
-
Honolulu, Hawaii, USA. ACM Press, March
-
V. Nunes Leal Franqueira, R. Lopes, and P. van Eck, "Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients," in Proc. of the 24th Annual ACM Symposium on Applied Computing (SAC'09), Honolulu, Hawaii, USA. ACM Press, March 2009, pp. 66-73.
-
(2009)
Proc. of the 24th Annual ACM Symposium On Applied Computing (SAC'09)
, pp. 66-73
-
-
Nunes, L.F.V.1
Lopes, R.2
van Eck, P.3
-
17
-
-
35048862521
-
The GROOVE simulator: A tool for state space generation
-
Charlottesville, VA, USA, LNCS, Springer-Verlag, September-October
-
A. Rensink, "The GROOVE simulator: A tool for state space generation," in Proc. of the 2nd International Workshop on Applications of Graph Transformations with Industrial Relevance (AGTIVE'03), Charlottesville, VA, USA, LNCS, vol. 3062. Springer-Verlag, September-October 2004, pp. 479-485.
-
(2004)
Proc. of the 2nd International Workshop On Applications of Graph Transformations With Industrial Relevance (AGTIVE'03)
, vol.3062
, pp. 479-485
-
-
Rensink, A.1
-
18
-
-
56449120885
-
Security, cryptography and directed bigraphs
-
Leicester, UK, LNCS, ser. LNCS, Springer-Verlag, September
-
D. Grohmann, "Security, cryptography and directed bigraphs," in Proc. of the 4th International Conference on Graph Transformation (ICGT'08), Leicester, UK, LNCS, ser. LNCS, vol. 5214. Springer-Verlag, September 2008, pp. 487-489.
-
(2008)
Proc. of the 4th International Conference On Graph Transformation (ICGT'08)
, vol.5214
, pp. 487-489
-
-
Grohmann, D.1
-
19
-
-
84944053907
-
Bigraphical reactive systems
-
Aalborg, Denmark, LNCS, Springer-Verlag, August
-
R. Milner, "Bigraphical reactive systems," in Proc. of the 12th International Conference on Concurrency Theory (CONCUR'01), Aalborg, Denmark, LNCS, vol. 2154. Springer-Verlag, August 2001, pp. 16-35.
-
(2001)
Proc. of the 12th International Conference On Concurrency Theory (CONCUR'01)
, vol.2154
, pp. 16-35
-
-
Milner, R.1
-
20
-
-
84979246873
-
Mobile agents coordination in Mobadtl
-
Limassol, Cyprus, LNCS, Springer-Verlag, September
-
G. Ferrari, C. Montangero, L. Semini, and S. Semprini, "Mobile agents coordination in Mobadtl," in Proc. of the 4th International Conference on Coordination Languages and Models (COORDINATION'00), Limassol, Cyprus, LNCS, vol. 1907. Springer-Verlag, September 2000, pp. 232-248.
-
(2000)
Proc. of the 4th International Conference On Coordination Languages and Models (COORDINATION'00)
, vol.1907
, pp. 232-248
-
-
Ferrari, G.1
Montangero, C.2
Semini, L.3
Semprini, S.4
-
21
-
-
77956988169
-
M2D2: A formal data model for IDS alert correlation
-
Zurich, Switzerland, LNCS, Springer-Verlag, October
-
B. Morin, L. Mé, H. Debar, and M. Ducassé, "M2D2: A formal data model for IDS alert correlation," in Proc. of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID'02), Zurich, Switzerland, LNCS, vol. 2516. Springer-Verlag, October 2002, pp. 115-137.
-
(2002)
Proc. of the 5th International Symposium On Recent Advances In Intrusion Detection (RAID'02)
, vol.2516
, pp. 115-137
-
-
Morin, B.1
Mé, L.2
Debar, H.3
Ducassé, M.4
-
22
-
-
46749114820
-
Modelling of quality of protection in outsourced business processes
-
Manchester, UK. IEEE, August
-
F. Massacci and A. Yautsiukhin, "Modelling of quality of protection in outsourced business processes," in Proc. of the 3rd International Symposium on Information Assurance and Security (IAS'07), Manchester, UK. IEEE, August 2007, pp. 247-252.
-
(2007)
Proc. of the 3rd International Symposium On Information Assurance and Security (IAS'07)
, pp. 247-252
-
-
Massacci, F.1
Yautsiukhin, A.2
-
23
-
-
80053192249
-
Assessing the risk of an information infrastructure through security dependencies
-
Samos Island, Greece, LNCS, Springer-Verlag, August-September
-
F. Baiardi, S. Suin, C. Telmon, and M. Pioli, "Assessing the risk of an information infrastructure through security dependencies," in Proc. of the 1st International Workshop on Critical Information Infrastructures Security (CRITIS'06), Samos Island, Greece, LNCS, vol. 4347. Springer-Verlag, August-September 2006, pp. 42-54.
-
(2006)
Proc. of the 1st International Workshop On Critical Information Infrastructures Security (CRITIS'06)
, vol.4347
, pp. 42-54
-
-
Baiardi, F.1
Suin, S.2
Telmon, C.3
Pioli, M.4
-
24
-
-
0000372791
-
Klaim: A kernel language for agents interaction and mobility
-
May
-
R. D. Nicola, G. L. Ferrari, and R. Pugliese, "Klaim: A kernel language for agents interaction and mobility," IEEE Transactions on software engineering, vol. 24, no. 5, pp. 315-330, May 1998.
-
(1998)
IEEE Transactions On Software Engineering
, vol.24
, Issue.5
, pp. 315-330
-
-
Nicola, R.D.1
Ferrari, G.L.2
Pugliese, R.3
-
25
-
-
35248866884
-
Resource access and mobility control with dynamic privileges acquisition
-
The Netherlands, LNCS, Springer-Verlag, June-July
-
D. Gorla and R. Pugliese, "Resource access and mobility control with dynamic privileges acquisition," in Proc. of the 14th International Colloquium on Automata, Languages and Programming (ICALP'03), Eindhoven, The Netherlands, LNCS, vol. 2719. Springer-Verlag, June-July 2003, pp. 119-132.
-
(2003)
Proc. of the 14th International Colloquium On Automata, Languages and Programming (ICALP'03), Eindhoven
, vol.2719
, pp. 119-132
-
-
Gorla, D.1
Pugliese, R.2
-
26
-
-
0036040231
-
An infrastructure language for open nets
-
Madrid, Spain. ACM Press, March
-
L. Bettini, M. Loreti, and R. Pugliese, "An infrastructure language for open nets," in Proc. of the 2002 ACM Symposium on Applied Computing (SAC'02), Madrid, Spain. ACM Press, March 2002, pp. 373-377.
-
(2002)
Proc. of the 2002 ACM Symposium On Applied Computing (SAC'02)
, pp. 373-377
-
-
Bettini, L.1
Loreti, M.2
Pugliese, R.3
-
27
-
-
38149049950
-
Where can an insider attack?
-
Hamilton, Ontario, Canada, LNCS, Springer-Verlag, August
-
C. Probst, R. Hansen, and F. Nielson, "Where can an insider attack?" in Proc. of The 4th International Workshop on Formal Aspects in Security and Trust (FAST'06), Hamilton, Ontario, Canada, LNCS, vol. 4691. Springer-Verlag, August 2007, pp. 127-142.
-
(2007)
Proc. of the 4th International Workshop On Formal Aspects In Security and Trust (FAST'06)
, vol.4691
, pp. 127-142
-
-
Probst, C.1
Hansen, R.2
Nielson, F.3
-
29
-
-
0002802925
-
A summary of a convenient vocabulary for the semiotics of human and nonhuman assemblies
-
W. Bijker and J. Law, Eds. Cambridge, MA: MIT Press
-
M. Akrich and B. Latour, "A summary of a convenient vocabulary for the semiotics of human and nonhuman assemblies," in Shaping Technology/Building Society: Studies in Sociotechnical Change, W. Bijker and J. Law, Eds. Cambridge, MA: MIT Press, 1992, pp. 259-264.
-
(1992)
Shaping Technology/Building Society: Studies In Sociotechnical Change
, pp. 259-264
-
-
Akrich, M.1
Latour, B.2
-
30
-
-
0002355487
-
Actor-network theory and IS research: Current status and future prospects
-
A. Lee, J. Liebenau, and J. DeGross, Eds. London: Chapman Hall
-
G. Walsham, "Actor-network theory and IS research: Current status and future prospects," in Information Systems and Qualitative Research, A. Lee, J. Liebenau, and J. DeGross, Eds. London: Chapman Hall, 1997, pp. 466-480.
-
(1997)
Information Systems and Qualitative Research
, pp. 466-480
-
-
Walsham, G.1
-
32
-
-
0011101139
-
Information ethics: On the philosophical foundation of computer ethics
-
L. Floridi, "Information ethics: on the philosophical foundation of computer ethics," Ethics and Information Technology, vol. 1, no. 1, pp. 37-56, 1999.
-
(1999)
Ethics and Information Technology
, vol.1
, Issue.1
, pp. 37-56
-
-
Floridi, L.1
-
34
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
Washington, DC, USA. ACM Press, November
-
P. Ammann, D. Wijesekera, and S. Kaushik, "Scalable, graph-based network vulnerability analysis," in Proc. of the 9th ACM Conference on Computer and Communications Security (ACM CCS'02), Washington, DC, USA. ACM Press, November 2002, pp. 217-224.
-
(2002)
Proc. of the 9th ACM Conference On Computer and Communications Security (ACM CCS'02)
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
35
-
-
33745849657
-
Foundations of attack trees
-
Seoul, Korea, LNCS, Springer-Verlag, December
-
S. Mauw and M. Oostdijk, "Foundations of attack trees," in Proc. of the 8th Annual International Conference on Information Security and Cryptology (ICISC'05), Seoul, Korea, LNCS, vol. 3935. Springer-Verlag, December 2006, pp. 186-198.
-
(2006)
Proc. of the 8th Annual International Conference On Information Security and Cryptology (ICISC'05)
, vol.3935
, pp. 186-198
-
-
Mauw, S.1
Oostdijk, M.2
-
36
-
-
34547239511
-
A scalable approach to attack graph generation
-
Alexandria, USA. ACM Press, October-November
-
X. Ou, W. Boyer, and M. McQueen, "A scalable approach to attack graph generation," in Proc. of the 13th ACM Conference on Computer and Communications Security (ACM CCS'06), Alexandria, USA. ACM Press, October-November 2006, p. 345.
-
(2006)
Proc. of the 13th ACM Conference On Computer and Communications Security (ACM CCS'06)
, pp. 345
-
-
Ou, X.1
Boyer, W.2
McQueen, M.3
-
37
-
-
84867876949
-
-
Centre for Telematics and Information Technology University of Twente, Enschede, Technical Report TR-CTIT-10-18, April
-
A. Ghamarian, M. de Mol, A. Rensink, E. Zambon, and M. Zimakova, "Modelling and analysis using GROOVE," http://eprints.eemcs.utwente.nl/17830/, Centre for Telematics and Information Technology University of Twente, Enschede, Technical Report TR-CTIT-10-18, April 2010.
-
(2010)
Modelling and Analysis Using GROOVE
-
-
Ghamarian, A.1
de Mol, M.2
Rensink, A.3
Zambon, E.4
Zimakova, M.5
|