1. 2016
  2. Published

    Future-dependent Flow Policies with Prophetic Variables. / Li, Ximeng; Nielson, Flemming; Nielson, Hanne Riis.

    Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security. 2016. p. 29-42 (Proceedings of the 2016 Acm Workshop on Programming Languages and Analysis for Security (plas'16)).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2017

  3. Published

    Guaranteeing Privacy-Observing Data Exchange. / Probst, Christian W.

    Proceedings of the 7th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation - Foundational Techniques (ISoLA 2016): Part I. Springer, 2016. p. 958-969 (Lecture Notes in Computer Science, Vol. 9952).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2016

  4. Submitted

    High Performance with Prescriptive Optimization and Debugging. / Jensen, Nicklas Bo; Probst, Christian W. (Supervisor); Karlsson, Sven (Supervisor).

    Kgs. Lyngby : Technical University of Denmark (DTU), 2016. 186 p. (DTU Compute PHD-2016; No. 437).

    Publication: ResearchPh.D. thesis – Annual report year: 2016

  5. Published

    Iterated Process Analysis over Lattice-Valued Regular Expressions. / Midtgaard, Jan; Nielson, Flemming; Nielson, Hanne Riis.

    Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming (PPDP '16). Association for Computing Machinery, 2016. p. 132-145.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2016

  6. Published

    Model Based Analysis of Insider Threats. / Chen, Taolue ; Han, Tingting ; Kammueller, Florian ; Nemli, Ibrahim ; Probst, Christian W.

    Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security) . IEEE, 2016.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2016

  7. Published

    Modelling and Verifying Communication Failure of Hybrid Systems in HCSP. / Wang, Shuling ; Nielson, Flemming; Nielson, Hanne Riis; Zhan, Naijun.

    In: Computer Journal, Vol. 60, No. 8, 2016, p. 1111-1130.

    Publication: Research - peer-reviewJournal article – Annual report year: 2017

  8. Published

    Preface: Special section on Graph Inspection and Traversal Engineering (GRAPHITE 2014). / Bosnacki, Dragan; Edelkamp, Stefan; Lluch Lafuente, Alberto; Wijs, Anton.

    In: Science of Computer Programming, Vol. 130, 2016, p. 1.

    Publication: ResearchEditorial – Annual report year: 2017

  9. Published

    Quantitative Verification and Synthesis of Attack-Defence Scenarios. / Aslanyan, Zaruhi; Nielson, Flemming; Parker, David.

    Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF 2016). IEEE, 2016. p. 105-119 (I E E E Computer Security Foundations Symposium. Proceedings).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2016

  10. Published

    Security protocol specification and verification with AnBx. / Bugliesi, Michele; Calzavara, Stefano; Mödersheim, Sebastian Alexander; Modesti, Paolo.

    In: Journal of Information Security and Applications, Vol. 30, 2016, p. 46-63.

    Publication: Research - peer-reviewJournal article – Annual report year: 2016

  11. Published

    Security Protocols: Specification, Verification, Implementation, and Composition. / Almousa, Omar; Mödersheim, Sebastian Alexander (Supervisor); Nielson, Hanne Riis (Supervisor).

    Kgs. Lyngby : Technical University of Denmark (DTU), 2016. 164 p. (DTU Compute PHD-2015; No. 391).

    Publication: ResearchPh.D. thesis – Annual report year: 2016

Previous 1 2 3 4 5 6 7 8 ...15 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
Word