Language-Based Technology

  1. 2012
  2. Published

    A General Framework for Probabilistic Characterizing Formulae. / Sack, Joshua; Zhang, Lijun.

    In: Lecture Notes in Computer Science, Vol. 7148, 2012, p. 396-411.

    Publication: Research - peer-reviewConference article – Annual report year: 2012

  3. Published

    A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability. / Pieters, Wolter; van der Ven, Sanne H.G.; Probst, Christian W.

    Proceedings of the 2012 workshop on New security paradigms. Association for Computing Machinery, 2012. p. 1-14.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  4. Published

    A Succinct Approach to Static Analysis and Model Checking. / Filipiuk, Piotr; Nielson, Hanne Riis (Main supervisor); Nielson, Flemming (Supervisor).

    Kgs. Lyngby : Technical University of Denmark, 2012. 187 p. (IMM-PHD-2012; No. 278).

    Publication: ResearchPh.D. thesis – Annual report year: 2012

  5. Published

    Belief Bisimulation for Hidden Markov Models Logical Characterisation and Decision Algorithm. / Jansen, David N.; Nielson, Flemming; Zhang, Lijun.

    NASA Formal Methods: 4th International Symposium, NFM 2012, Norfolk, VA, USA, April 3-5, 2012. Proceedings. Springer, 2012. p. 326-340 (Lecture Notes in Computer Science, Vol. 7226).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  6. Published

    Deciding Security for a Fragment of ASLan. / Mödersheim, Sebastian Alexander.

    Technical University of Denmark, 2012. 24 p. (IMM-Technical Report-2012; No. 06).

    Publication: ResearchReport – Annual report year: 2012

  7. Published

    Deciding Security for a Fragment of ASLan. / Mödersheim, Sebastian Alexander.

    Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer, 2012. p. 127-144 (Lecture Notes in Computer Science, Vol. 7459).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  8. Published

    Distributed security in closed distributed systems. / Hernandez, Alejandro Mario; Nielson, Flemming (Main supervisor); Nielson, Hanne Riis (Supervisor).

    Kgs. Lyngby : Technical University of Denmark (DTU), 2012. 198 p. (IMM-PHD-2012; No. 274).

    Publication: ResearchPh.D. thesis – Annual report year: 2012

  9. Published

    Efficient CSL Model Checking Using Stratification. / Zhang, Lijun; Jansen, David N.; Nielson, Flemming; Hermanns, Holger.

    In: Logical Methods in Computer Science, Vol. 8, No. 2, 2012, p. Paper 17.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  10. Published

    Fixpoints vs Moore Families. / Zhang, Fuyuan; Nielson, Flemming; Nielson, Hanne Riis.

    Proceedings of SOFSEM 2011. 2012.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  11. Published

    Fixpoints vs Moore Families. / Zhang, Fuyuan; Nielson, Flemming; Nielson, Hanne Riis.

    2012. Poster session presented at 38th International Conference on Current Trends in Theory and Practice of Computer Science : Student Research Forum, Špindlerův Mlýn, Czech Republic.

    Publication: Research - peer-reviewPoster – Annual report year: 2012

  12. Published

    Flow Logic for Process Calculi. / Nielson, Hanne Riis; Nielson, Flemming; Pilegaard, Henrik.

    In: A C M Computing Surveys, Vol. 44, No. 1, 2012, p. Article No. 3.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  13. Published

    From Explicit to Symbolic Types for Communication Protocols in CCS. / Nielson, Hanne Riis; Nielson, Flemming; Kreiker, Jörg; Pilegaard, Henrik.

    Formal Modeling: Actors, Open Systems, Biological Systems: Essays Dedicated to Carolyn Talcott on the Occasion of Her 70th Birthday. Springer, 2012. p. 74-89 (Lecture Notes in Computer Science; No. 7000).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  14. Published

    Globally reasoning about localised security policies in distributed systems. / Hernandez, Alejandro Mario.

    Kgs. Lyngby : Technical University of Denmark, 2012. 45 p. (IMM-Technical Report-2012; No. 11).

    Publication: ResearchReport – Annual report year: 2012

  15. Published

    Key Update Assistant for Resource-Constrained Networks. / Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming.

    2012 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2012. p. 000075-000081 (I E E E International Symposium on Computers and Communications).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  16. Published

    Layered Fixed Point Logic. / Filipiuk, Piotr; Nielson, Flemming; Nielson, Hanne Riis.

    Proceedings of the 14th symposium on Principles and practice of declarative programming. Association for Computing Machinery, 2012. p. 45-54.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  17. Published

    Lazy Mobile Intruders. / Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis.

    Kgs. Lyngby : Technical University of Denmark, 2012. 20 p. (IMM-Technical Report-2012; No. 13).

    Publication: ResearchReport – Annual report year: 2012

  18. Published

    LBTool: A stochastic toolkit for leave-based key updates. / Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming; Nielsen, Bo Friis.

    2012 IEEE Symposium on Computers and Communications. IEEE, 2012. p. 868-875.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  19. Published

    Model Checking as Static Analysis. / Zhang, Fuyuan; Nielson, Flemming (Main supervisor); Nielson, Hanne Riis (Supervisor).

    Kgs. Lyngby : Technical University of Denmark, 2012. 174 p. (IMM-PHD-2012; No. 280).

    Publication: ResearchPh.D. thesis – Annual report year: 2012

  20. Published

    Model Checking as Static Analysis: Revisited. / Zhang, Fuyuan; Nielson, Flemming; Nielson, Hanne Riis.

    Integrated Formal Methods: 9th International Conference, IFM 2012 Pisa, Italy, June 18-21, 2012 Proceedings. Springer, 2012. p. 99-112 (Lecture Notes in Computer Science; No. 7321).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  21. Published

    Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study. / Yuksel, Ender; Zhu, Huibiao ; Nielson, Hanne Riis; Huang, Heqing; Nielson, Flemming.

    2012 Sixth International Symposium on Theoretical Aspects of Software Engineering (TASE). IEEE, 2012. p. 25-32.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  22. Published

    Modelling Chinese Smart Grid : A Stochastic Model Checking Case Study. / Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming; Zhu, Huibiao; Huang, Heqing.

    Kgs. Lyngby, Denmark : Technical University of Denmark, DTU Informatics, Building 321, 2012. 58 p. (IMM-Technical Report-2012; No. 02).

    Publication: ResearchReport – Annual report year: 2012

  23. Published

    Opdagelse og forhindring af insider-trusler. / Probst, Christian W.

    It-sikkerhed. Børsen, 2012. (Børsen Ledelseshåndbøger).

    Publication: ResearchBook chapter – Annual report year: 2012

  24. Published

    Position paper: A generic approach for security policies composition. / Hernandez, Alejandro Mario; Nielson, Flemming.

    PLAS '12 Proceedings of the 7th Workshop on Programming Languages and Analysis for Security . Association for Computing Machinery, 2012. p. Article No. 5.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  25. Published

    Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider. / Probst, Christian W.; Sasse, M. Angela ; Pieters, Wolter; Dimkov, Trajce; Luysterborg, Erik; Arnaud, Michel.

    European Data Protection: In Good Health?. Springer, 2012. p. 251-265.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2012

  26. Published

    Recursive Advice for Coordination. / Terepeta, Michal Tomasz; Nielson, Hanne Riis; Nielson, Flemming.

    Coordination Models and Languages: 14th International Conference, COORDINATION 2012 Stockholm, Sweden, June 14-15, 2012 Proceedings. ed. / Marjan Sirjani. 2012. p. 137-151 (Lecture Notes in Computer Science; No. 7274).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  27. Published

    Static Analysis of IMC. / Skrypnyuk, Nataliya; Nielson, Flemming; Pilegaard, Henrik.

    In: Journal of Logic and Algebraic Programming, Vol. 81, No. 4, 2012, p. 522-540.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  28. Published

    The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures. / Armando, Alessandro; Arsac, Wihem; Avanesov, Tigran; Barletta, Michele; Calvi, Alberto; Cappai, Alessandro; Carbone, Roberto; Chevalier, Yannick; Compagna, Luca; Cuéllar, Jorge; Erzse, Gabriel; Frau, Simone; Minea, Marius; Mödersheim, Sebastian Alexander; Von Oheimb, David; Pellegrino, Giancarlo; Ponta, Serena Elisa; Rocchetto, Marco; Rusinowitch, Michael; Torabi Dashti, Mohammad; Turuani, Mathieu; Viganò, Luca.

    Tools and Algorithms for the Construction and Analysis of Systems: 18th International Conference, TACAS 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 – April 1, 2012. Proceedings. Springer, 2012. p. 267-282 (Lecture Notes in Computer Science, Vol. 7214).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  29. Published

    The Cyber-Physical Attacker. / Vigo, Roberto.

    Computer Safety, Reliability, and Security: SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE Magdeburg, Germany, September 25-28, 2012 Proceedings. Springer, 2012. p. 347-356 (Lecture Notes in Computer Science, Vol. 7613).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  30. Published

    The Logic of XACML. / Ramli, Carroline Dewi Puspa Kencana; Nielson, Hanne Riis; Nielson, Flemming.

    Formal Aspects of Component Software: 8th International Symposium, FACS 2011, Oslo, Norway, September 14-16, 2011, Revised Selected Papers. Springer, 2012. p. 205-222 (Lecture Notes in Computer Science, Vol. 7253).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  31. Published

    Theory of Security and Applications : Joint Workshop, TOSCA 2011 Saarbrücken, Germany, March 31 - April 1, 2011 Revised Selected Papers. / Mödersheim, Sebastian Alexander (Editor); Palamidessi, Catuscia (Editor).

    Springer, 2012. (Lecture Notes in Computer Science, Vol. 6993).

    Publication: Research - peer-reviewBook – Annual report year: 2012

  32. Published

    Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks. / Di Mauro, Alessio; Papini, Davide; Vigo, Roberto; Dragoni, Nicola.

    Networked Digital Technologies: 4th International Conference, NDT 2012 Dubai, UAE, April 24-26, 2012 Proceedings, Part II. Springer, 2012. p. 289-301 (Communications in Computer and Information Science, Vol. 294).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  33. 2011
  34. Published

    Adapt or Become Extinct! : The Case for a Unified Framework for Deployment-Time Optimization. / Goumas, Georgios; McKee, Sally A.; Själander, Magnus; Gross, Thomas R.; Karlsson, Sven; Probst, Christian W.; Zhang, Lixin.

    EXADAPT '11 Proceedings of the 1st International Workshop on Adaptive Self-Tuning Computing Systems for the Exaflop Era. University of Strathclyde, 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  35. Published

    A Framework for Constraint-Programming based Configuration. / Queva, Matthieu Stéphane Benoit; Probst, Christian W. (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2011. 227 p. (IMM-PHD-2011; No. 260).

    Publication: ResearchPh.D. thesis – Annual report year: 2011

  36. Published

    Analysing Protocol Stacks for Services. / Gao, Han; Nielson, Flemming; Nielson, Hanne Riis.

    Rigorous Software Engineering for Service-Oriented Systems: Results of the SENSORIA Project on Software Engineering for Service-Oriented Computing. ed. / Martin Wirsing; Matthias Hölzl. Vol. 6582 Springer, 2011. p. 369-389 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  37. Published

    A Stochastic Broadcast Pi-Calculus. / Song, Lei; Nielson, Flemming; Nielsen, Bo Friis.

    In: Electronic Proceedings in Theoretical Computer Science, Vol. 57, No. Proc. QAPL 2011, 2011, p. 74-88.

    Publication: Research - peer-reviewConference article – Annual report year: 2011

  38. Published

    Automata-Based CSL Model Checking. / Zhang, Lijun; Jansen, David N.; Nielson, Flemming; Hermanns, Holger.

    Automata, Languages and Programming: 38th International Colloquium, ICALP 2011 - Zurich, Switzerland, July 4-8, 2011 - Proceedings, Part II. Springer, 2011. p. 271-282 (Lecture Notes in Computer Science; No. 6756).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  39. Published

    Automated Verification of Virtualized Infrastructures. / Bleikertz, Sören; Gross, Thomas; Mödersheim, Sebastian Alexander.

    CCSW '11 Proceedings of the 3rd ACM workshop on Cloud computing security workshop. ACM, 2011. p. 47-58.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  40. Published

    A ZigBee-based Automatic Meter Reading System. / Yüksel, Emre; Zaim, Abdül Halim; Yuksel, Ender; Aydin, Muhammed Ali.

    Proceedings of the International Conference on Networking and Future Internet (ICNFI 2011). 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  41. Published

    Bisimulations Meet PCTL Equivalences for Probabilistic Automata. / Song, Lei; Zhang, Lijun; Godskesen, Jens Chr.

    CONCUR 2011 – Concurrency Theory: 22nd International Conference, CONCUR 2011 Aachen, Germany, September 6-9, 2011 Proceedings. Vol. 6901 Springer, 2011. p. 108-123 (Lecture Notes in Computer Science; No. 6901).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  42. Published

    CaPiTo: protocol stacks for services. / Gao, Han; Nielson, Flemming; Nielson, Hanne Riis.

    In: Formal Aspects of Computing, Vol. 23, No. 4, 2011, p. 541-565.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  43. Published

    CDIO Projects in DTU’s B.Eng. in IT Study Program. / Sparsø, Jens; Bolander, Thomas; Fischer, Paul; Hansen, Thomas Kjærgård; Høgh, Stig; Nyborg, Mads; Probst, Christian W.; Todirica, Edward Alexandru.

    Proceedings of the 7th International CDIO Conference, Technical University of Denmark, Copenhagen, June 20 - 23, 2011. Lyngby : Technical University of Denmark, 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  44. Published

    Characteristics of Key Update Strategies for Wireless Sensor Networks. / Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming.

    Proceedings of the International Conference on Network Communication and Computer (ICNCC 2011). 2011. p. 132-136.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  45. Published

    Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces. / Yang, Fan; Aotani, Tomoyuki; Masuhara, Hidehiko; Nielson, Flemming; Nielson, Hanne Riis.

    Coordination Models and Languages: 13th International Conference, COORDINATION 2011, Reykjavik, Iceland, June 6-9, 2011 - Proceedings. Vol. 6721 Springer, 2011. p. 202-218 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  46. Published

    Compositional abstractions for long-run properties of stochastic systems. / Smith, Michael James Andrew.

    2011 Eighth International Conference on Quantitative Evaluation of Systems (QEST). IEEE, 2011. p. 223-232.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  47. Published

    Controlling Modelling Artifacts. / Smith, Michael James Andrew; Nielson, Flemming; Nielson, Hanne Riis.

    2011 Eighth International Conference on Quantitative Evaluation of Systems (QEST). IEEE, 2011. p. 171-180.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  48. Published
  49. Published

    Diffie-Hellman without Difficulty. / Mödersheim, Sebastian Alexander.

    Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011. ed. / Gilles Barthe; Anupam Datta; Sandro Etalle . Springer, 2011. p. 214-229 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  50. Published

    Efficient Approximation of Optimal Control for Markov Games. / Fearnley, John; Rabe, Markus; Schewe, Sven; Zhang, Lijun.

    Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science. 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  51. Published

    From Concurrency Models to Numbers : Performancd and Dependability. / Hermanns, Holger; Zhang, Lijun.

    NATO Science for Peace and Security Series: D: Information and Communication Security. Vol. 30 IOS Press, 2011. p. 182-210.

    Publication: ResearchBook chapter – Annual report year: 2011

  52. Published

    Galois Connections for Flow Algebras. / Filipiuk, Piotr; Terepeta, Michal Tomasz; Nielson, Hanne Riis; Nielson, Flemming.

    Formal Techniques for Distributed Systems: Joint 13th IFIP WG 6.1 International Conference, FMOODS 2011 and 30th IFIP WG 6.1 International Conference, FORTE 2011 Reykjavik, Iceland, June 6-9, 2011 Proceedings. Springer, 2011. p. 138-152 (Lecture Notes in Computer Science; No. 6722).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  53. Published

    Game-based Abstraction and Controller Synthesis for Probabilistic Hybrid Systems. / Hahn, Ernst Moritz; Norman, Gethin; Parker, David; Wachter, Björn; Zhang, Lijun.

    2011 Eighth International Conference on Quantitative Evaluation of Systems (QEST). 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  54. Published

    Hardware Support for Dynamic Languages. / Schleuniger, Pascal; Karlsson, Sven; Probst, Christian W.

    ACACES 2011 Seventh International Summer School on Advanced Computer Architecture and Compilation for High-Performance and Embedded Systems. 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  55. Published

    Hardware Support for Dynamic Languages. / Schleuniger, Pascal; Karlsson, Sven; Probst, Christian W.

    2011. Poster session presented at 7th International Summer School on Advanced Computer Architecture and Compilation for High-Performance and Embedded Systems, Fiuggi, Italy.

    Publication: Research - peer-reviewPoster – Annual report year: 2011

  56. Published

    Identifying and Mitigating Insider Threats. / Probst, Christian W.

    In: I T - Information Technology, Vol. 53, No. 4, 2011, p. 202-206.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  57. Published

    Insiders and Insider Threats : An Overview of Definitions and Mitigation Techniques. / Hunker, Jeffrey; Probst, Christian W.

    In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 2, No. 1, 2011, p. 4-27.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  58. Published

    Measurability and Safety Verification for Stochastic Hybrid Systems. / Fränzle, Martin; Hahn, Ernst Moritz; Hermanns, Holger; Wolovick, Nicolás; Zhang, Lijun.

    Proceedings of the 14th international conference on Hybrid systems: computation and control. Association for Computing Machinery, 2011. p. 43-52.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  59. Published

    Modal abstractions of concurrent behavior. / Nielson, Flemming; Nanz, Sebastian; Nielson, Hanne Riis.

    In: A C M Transactions on Computational Logic, Vol. 12, No. 3, 2011, p. 18.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  60. Published

    Model Checking Algorithms for CTMDPs. / Buchholz, Peter; Hahn, Ernst Moritz; Hermanns, Holger; Zhang, Lijun.

    Computer Aided Verification: 23rd International Conference, CAV 2011 - Snowbird, UT, USA, July 14-20, 2011 - Proceedings. Springer, 2011. p. 225-242 (Lecture Notes in Computer Science; No. 6806).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  61. Published

    Modelling Configuration Knowledge in Heterogeneous Product Families. / Queva, Matthieu Stéphane Benoit; Männistö, Tomi; Ricci, Laurent; Probst, Christian W.

    Proceedings of the Workshop on Configuration (ConfWS 2011). 2011. p. 9-18.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  62. Published

    On Stabilization in Herman’s Algorithm. / Kiefer, Stefan; Murawski, Andrzej S.; Ouaknine, Joël; Worrell, James; Zhang, Lijun.

    Automata, Languages and Programming: 38th International Colloquium, ICALP 2011 - Zurich, Switzerland, July 4-8, 2011 - Proceedings, Part II. Springer, 2011. p. 466-477 (Lecture Notes in Computer Science; No. 6756).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  63. Published

    Optimizing Key Updates in Sensor Networks. / Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming; Fruth, Matthias; Kwiatkowska, Marta.

    2011 IEEE Sensors Applications Symposium (SAS). IEEE, 2011. p. 82-87.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  64. Published

    Probabilistic Logical Characterization. / Hermanns, Holger; Parma, Augusto; Segala, Roberto; Wachter, Björn; Zhang, Lijun.

    In: Information and Computation, Vol. 209, No. 2, 2011, p. 154-172.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  65. Published

    Probabilistic Reachability for Parametric Markov Models. / Hahn, Ernst Moritz; Hermanns, Holger; Zhang, Lijun.

    In: International Journal on Software Tools for Technology Transfer, Vol. 13, No. 1, 2011, p. 3-19.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  66. Published

    Qualitative and Quantitative Security Analyses for ZigBee Wireless Sensor Networks. / Yuksel, Ender; Nielson, Hanne Riis (Supervisor); Nielson, Flemming (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2011. 306 p. (IMM-PHD-2011; No. 247).

    Publication: ResearchPh.D. thesis – Annual report year: 2011

  67. Published

    Reachability for Finite-State Process Algebras Using Static Analysis. / Skrypnyuk, Nataliya; Nielson, Flemming.

    Reachability Problems: 5th InternationalWorkshop, RP 2011 Genoa, Italy, September 28-30, 2011, Proceedings. Vol. 6945 Springer, 2011. p. 231-244 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  68. Published

    Resilience Analysis of Key Update Strategies for Resource-Constrained Networks. / Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming.

    2011 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). 2011. (Uden navn).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  69. Published

    Synthesis for PCTL in Parametric Markov Decision Processes. / Hahn, Ernst Moritz; Han, Tingting; Zhang, Lijun.

    NASA Formal Methods: Third International Symposium, NFM 2011 - Pasadena, CA, USA, April 18-20, 2011 - Proceedings. Springer, 2011. p. 146-161 (Lecture Notes in Computer Science; No. 6617).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  70. Published

    The Guided System Development Framework. / Carvalho Quaresma, Jose Nuno; Probst, Christian W.; Nielson, Flemming.

    Proceedings of the 23rd Nordic Workshop Programming Theory. 2011. p. 69-72.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  71. Published

    The Logic of XACML. / Ramli, Carroline Dewi Puspa Kencana; Nielson, Hanne Riis; Nielson, Flemming.

    Proceedings of FACS 2011. 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  72. Published

    Towards a Time-predictable Dual-Issue Microprocessor: The Patmos Approach. / Schoeberl, Martin; Schleuniger, Pascal; Puffitsch, Wolfgang; Brandner, Florian; Probst, Christian W.; Karlsson, Sven; Thorn, Tommy.

    Bringing Theory to Practice: Predictability and Performance in Embedded Systems: PPES’11, March 18, 2011, Grenoble, France. Vol. 18 OASICS, 2011. p. 11-21.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  73. Published

    Towards Formal Validation of Trust and Security of the Internet of Services. / Carbone, Roberto; Minea, Marius; Mödersheim, Sebastian Alexander; Ponta, Serena Elisa; Turuani, Mathieu; Viganò, Luca.

    The Future Internet: Future Internet Assembly 2011: Achievements and Technological Promises. Springer, 2011. p. 193-207 (Lecture Notes in Computer Science; No. 6656).

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  74. Published

    Using Dafny, an Automatic Program Verifier. / Herbert, Luke Thomas; Leino, K. Rustan M.; Carvalho Quaresma, Jose Nuno.

    2011. Paper presented at 8th LASER Summer School on Software Engineering, Elba Island, Italy.

    Publication: Research - peer-reviewPaper – Annual report year: 2012

  75. Published

    Verification of Stochastic Process Calculi. / Skrypnyuk, Nataliya; Nielson, Flemming (Supervisor); Nielson, Hanne Riis (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2011. (IMM-PHD-2011-252).

    Publication: ResearchPh.D. thesis – Annual report year: 2011

  76. Published

    Verifying SeVeCom Using Set-based Abstraction. / Mödersheim, Sebastian Alexander; Modesti, Paolo.

    Kgs. Lyngby, Denmark : Technical University of Denmark, DTU Informatics, Building 321, 2011. (IMM-Technical Report-2011-01).

    Publication: ResearchReport – Annual report year: 2011

  77. Published

    Verifying SeVeCom Using Set-based Abstraction. / Mödersheim, Sebastian Alexander; Modesti, Paolo.

    2011 7th International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, 2011. p. 1164-1169.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  78. Published

    Vertical Protocol Composition. / Groß, Thomas; Mödersheim, Sebastian Alexander.

    Proceedings of the 24th Computer Security Foundations Symposium 2011. 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  79. Published

    Visualisation for Stochastic Process Algebras: The Graphic Truth. / Smith, Michael James Andrew; Gilmore, Stephen.

    Computer Performance Engineering: 8th European Performance Engineering Workshop, EPEW 2011 Borrowdale, UK, October 12-13, 2011 Proceedings. Springer, 2011. p. 310-324 (Lecture Notes in Computer Science; No. 6977).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  80. 2010
  81. E-pub ahead of print

    A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks. / Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming.

    In: Computer Journal, Vol. 54, No. 4, 04.2010, p. 589-601.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  82. Published

    Abstraction and Model Checking in the PEPA Plug-in for Eclipse. / Smith, Michael James Andrew.

    Proceedings of the 7th International Conference on Quantitative Evaluation of Systems (QEST 2010). IEEE Computer Society Press, 2010. p. 155-156.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  83. Published

    Abstraction by Set-Membership : Verifying Security Protocols and Web Services with Databases. / Mödersheim, Sebastian Alexander.

    Proceedings of the 17th ACM Conference on Computer and Communications Security. New York : Association for Computing Machinery, 2010. p. 351-360.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  84. Published

    A Formal Model of Identity Mixer. / Camenisch, Jan; Mödersheim, Sebastian Alexander; Sommer, Dieter.

    Proceedings of the 15th International Workshop on Formal Methods for Industrial Critical Systems. Heidelberg : Springer, 2010. p. 198-214 (Lecture Notes in Computer Science; No. LNCS 6371).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  85. Published

    ASLan++ — A Formal Security Specification Language for Distributed Systems. / Von Oheimb, David; Mödersheim, Sebastian Alexander.

    Formal Methods for Components and Objects: 9th International Symposium, FMCO 2010 Graz, Austria, November 29 - December 1, 2010 Revised Papers. Springer, 2010. p. 1-22 (Lecture Notes in Computer Science; No. 6957).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  86. Published

    AspectKE* : Security Aspects with Program Analysis for Distributed Systems. / Yang, Fan; Masuhara, Hidehiko; Aotani, Tomoyuki; Nielson, Flemming; Nielson, Hanne Riis.

    Proceedings of the 9th Workshop on Aspects, Components, and Patterns for Infrastructure Software (ACP4IS '10). ed. / Bram Adams; Michael Haupt; Daniel Lohmann. Universitätsverlag Potsdam, 2010. p. 27-31 (Technische Berichte des Hasso-Plattner-Instituts für Softwaresystemtechnik an der Universität Potsdam; No. 33).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  87. Published

    AspectKE*:Security Aspects with Program Analysis for Distributed Systems. / Yang, Fan (Author); Masuhara, Hidehiko (Author); Aotani, Tomoyuki (Author); Nielson, Flemming (Author); Nielson, Hanne Riis (Author).

    2010. Demonstration track of the 9th International Conference on Aspect-Oriented Software Development (AOSD'10), Rennes and Saint Malo, France : .

    Publication: ResearchInteractive production – Annual report year: 2010

  88. Published

    Aspects of Insider Threats. / Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter; Bishop, Matt.

    Aspects of Insider Threats. Springer, 2010. p. 1-16.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2010

  89. Published

    Aspects with Program Analysis for Security Policies. / Yang, Fan; Nielson, Flemming (Supervisor); Nielson, Hanne Riis (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2010. (IMM-PHD-2010-239).

    Publication: ResearchPh.D. thesis – Annual report year: 2010

  90. Published

    Compositional Abstraction of PEPA Models for Transient Analysis. / Smith, Michael James Andrew.

    Proceedings of the 7th European Performance Engineering Workshop (EPEW 2010). 2010. p. 252-267 (Lecture Notes in Computer Science; No. 6342).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  91. Published

    Concurrency and Composition in a Stochastic World. / Eisentraut, Christian (Invited author); Hermanns, Holger (Invited author); Zhang, Lijun (Invited author).

    In: Lecture Notes in Computer Science, 2010.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  92. Published

    Constraint Differentiation : Search-Space Reduction for the Constraint-Based Analysis of Security Protocols. / Mödersheim, Sebastian Alexander; Basin, David; Viganò, Luca.

    In: Journal of Computer Security, Vol. 18, No. 4, 2010, p. 575-618.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  93. E-pub ahead of print

    Explicit Versus Symbolic Algorithms for Solving ALFP Constraints. / Filipiuk, Piotr; Nielson, Hanne Riis; Nielson, Flemming.

    Electronic Notes in Theoretical Computer Science. Vol. 267 2010. p. 15-28.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  94. Published

    From Flow Logic to static type systems for coordination languages. / De Nicola, Rocco; Gorla, Daniele; Hansen, Rene Rydhof; Nielson, Flemming; Nielson, Hanne Riis; Probst, Christian W.; Pugliese, Rosario.

    In: Science of Computer Programming, Vol. 75, No. 6, 2010, p. 376-397.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  95. Published

    General purpose modeling languages for configuration. / Queva, Matthieu Stéphane Benoit.

    Kgs. Lyngby, Denmark : Technical University of Denmark, DTU Informatics, Building 321, 2010. (IMM-Technical Report-2010-12).

    Publication: ResearchReport – Annual report year: 2010

  96. E-pub ahead of print

    History-sensitive versus future-sensitive approaches to security in distributed systems. / Hernandez, Alejandro Mario; Nielson, Flemming.

    ICE2010: Third Interaction and Concurrency Experience. Vol. EPTCS 38 2010. p. 29-43.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  97. Published

    Insider Threats in Cyber Security. / Probst, Christian W. (Editor); Hunker, Jeffrey (Editor); Gollmann, Dieter (Editor); Bishop, Matt (Editor).

    Springer, 2010. 244 p. (Advances in Information Security; No. 49).

    Publication: Research - peer-reviewBook – Annual report year: 2010

  98. Published

    Maintaining Arc Consistency in Non-Binary Dynamic CSPs using Simple Tabular Reduction. / Queva, Matthieu Stéphane Benoit; Probst, Christian W.; Ricci, Laurent.

    Proceedings of the Fifth European Starting AI Researcher Symposium (STAIRS 2010). 2010.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  99. Published

    Model Checking Is Static Analysis of Modal Logic. / Nielson, Flemming; Nielson, Hanne Riis.

    In: Lecture Notes in Computer Science, Vol. 6014, 2010, p. 191-205.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  100. E-pub ahead of print

    Model Checking Multivariate State Rewards. / Nielsen, Bo Friis; Nielson, Flemming; Nielson, Hanne Riis.

    Seventh International Conference on the Quantitative Evaluation of Systems. 2010. p. 7-16.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  101. Published

    On Probabilistic Automata in Continuous Time. / Eisentraut, Christian; Hermanns, Holger; Zhang, Lijun.

    In: Symposium on Logic in Computer Science, 2010, p. 342 - 351.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  102. Published

    Optimizing ZigBee Security using Stochastic Model Checking. / Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming; Fruth, Matthias; Kwiatkowska, Marta.

    Kgs. Lyngby : Technical University of Denmark, DTU Informatics, Building 321, 2010. (IMM-Technical Report-2010-08).

    Publication: ResearchReport – Annual report year: 2010

  103. Published

    PARAM: A Model Checker for Parametric Markov Models. / Hahn, Ernst Moritz; Hermanns, Holger; Wachter, Björn; Zhang, Lijun.

    In: Lecture Notes in Computer Science, 2010.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  104. E-pub ahead of print

    Probabilistic Aspects: Checking Security in an Imperfect World. / Hankin, Chris; Nielson, Flemming; Nielson, Hanne Riis.

    In: Lecture Notes in Computer science, Vol. 6084, 2010, p. 348-363.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  105. Published

    Protocol Implementation Generator. / Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    Proceedings of The 15th Nordic Conference on Secure IT Systems. 2010.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  106. Published

    Safety Verification for Probabilistic Hybrid Systems. / Zhang, Lijun; She, Zhikun; Ratschan, Stefan; Hermanns, Holger; Hahn, Ernst Moritz.

    Computer Aided Verification, Proceedings. 2010. p. 196-211 (Lecture Notes in Computer Science, Vol. 6174).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  107. Published

    Security audits of multi-tier virtual infrastructures in public infrastructure clouds. / Bleikertz, Sören; Schunter, Matthias; Probst, Christian W.; Pendarakis, Dimitrios; Eriksson, Konrad.

    Proceedings of the 2010 ACM workshop on Cloud computing security workshop. 2010.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  108. Published

    Static analysis of topology-dependent broadcast networks. / Nanz, Sebastian; Nielson, Flemming; Nielson, Hanne Riis.

    In: Information and Computation, Vol. 208, No. 2, 2010, p. 117-139.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  109. Published

    The Risk of Risk Analysis. / Probst, Christian W.; Hunker, Jeffrey.

    Economics of Information Security and Privacy. Springer, 2010. p. 279-299.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2010

  110. Published

    Time-Bounded Reachability in Distributed Input/Output Interactive Probabilistic Chains. / Carlin, George; Crouzen, Pepijn; D'Agenio, Pedro; Hahn, Ernst Moritz; Zhang, Lijun.

    In: Lecture Notes in Computer Science, 2010.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  111. Published

    Time-Bounded Reachability Probabilities in Continuous-Time Markov Decision Processes. / Neuhäußer, Martin R.; Zhang, Lijun.

    In: Sixth International Conference on the Quantitative Evaluation of Systems, 2010.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  112. Published

    Verification Based on Set-Abstraction Using the AIF Framework. / Mödersheim, Sebastian Alexander.

    Kgs. Lyngby : Technical University of Denmark, DTU Informatics, Building 321, 2010. (IMM-Technical Report-2010-09).

    Publication: ResearchReport – Annual report year: 2010

  113. 2009
  114. Published

    A Verifiable Language for Cryptographic Protocols. / Nielsen, Christoffer Rosenkilde; Nielson, Flemming (Supervisor); Nielson, Hanne Riis (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2009. (IMM-PHD-2008-210).

    Publication: ResearchPh.D. thesis – Annual report year: 2009

  115. Published

    Constraint Solver Techniques for Implementing Precise and Scalable Static Program Analysis. / Zhang, Ye; Nielson, Flemming (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2009. (IMM-PHD-2008-211).

    Publication: ResearchPh.D. thesis – Annual report year: 2009

  116. Published

    Advice from Belnap Policies. / Hankin, Chris; Nielson, Flemming; Nielson, Hanne Riis.

    Computer Security Foundations Symposium, IEEE. Vol. 0 2009. p. 234-247.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  117. Published

    Analysing Access Control Specifications. / Probst, Christian W.; Hansen, René Rydhof.

    Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering. IEEE, 2009.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  118. Published

    A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks. / Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming.

    Proceedings of the 24th International Symposium on Computer and Information Sciences (ISCIS 2009). IEEE, 2009. p. 340-345.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  119. Published

    Enforcing Mandatory Access Control in Distributed Systems using Aspect-Orientation. / Hernandez, Alejandro Mario; Nielson, Flemming.

    21st Nordic Workshop on Programming Theory Proceedings. 2009. p. 62-64.

    Publication: ResearchConference abstract in proceedings – Annual report year: 2009

  120. Published

    Fluid Information Systems. / Probst, Christian W.; Hansen, René Rydhof.

    Proceedings of the New Security Paradigms Workshop. 2009. p. 125-132.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  121. Published

    Industrial requirements for interactive product configurators. / Queva, Matthieu Stéphane Benoit; Probst, Christian W.; Vikkelsøe, Per.

    Proceedings of the IJCAI–09 Workshop on Configuration (ConfWS–09). ed. / Markus Stumptner; Patrick Albert. 2009. p. 39-46.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  122. Published

    Pathway analysis of IMC. / Skrypnyuk, Nataliya; Nielson, Flemming; Pilegaard, Henrik.

    21st Nordic Workshop on Programming Theory: NWPT 2009. Lyngby, 2009. p. 7-10.

    Publication: ResearchConference abstract in proceedings – Annual report year: 2009

  123. Published

    Protocol Stacks for Services. / Gao, Han; Nielson, Flemming; Nielson, Hanne Riis.

    Foundations of computer security. 2009.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  124. Published

    Quantitative Security Analysis of ZigBee Key Updates. / Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming.

    Proceedings of the 21st Nordic Workshop on Programming Theory. ed. / Michael Reichhardt Hansen; Aske Wiid Brekling. Technical University of Denmark, DTU Informatics, Building 321, 2009. p. 14-16.

    Publication: ResearchConference abstract in proceedings – Annual report year: 2009

  125. Published

    The Risk of Risk Analysis : And its relation to the Economics of Insider Threats. / Probst, Christian W.; Hunker, Jeffrey.

    Proceedings of The Eighth Workshop on the Economics of Information Security. 2009.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  126. Published

    Towards A Comprehensive Study of Supply Chain Integrity. / Broda, Matt; Gorniak, Slawomir; Probst, Christian W.; Vishik, Claire.

    Workshop on Telecommunications Infrastructure Protection and Security. 2009.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  127. Published

    Transition systems : Hvordan virker en colaautomatk?. / Pilegaard, Henrik; Nanz, Sebastian; Nielson, Flemming; Nielson, Hanne Riis.

    Matematiske Horisonter. 2009. p. 63-79.

    Publication: Education - peer-reviewBook chapter – Annual report year: 2009

  128. 2008
  129. Published

    Analysis of Security Protocols by Annotations. / Gao, Han; Nielson, Hanne Riis (Supervisor); Nielson, Flemming (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2008. (IMM-PHD-2008-190).

    Publication: ResearchPh.D. thesis – Annual report year: 2008

  130. Published

    Advice for Coordination. / Hankin, Chris; Nielson, Flemming; Nielson, Hanne Riis; Yang, Fan.

    10th international conference on Coordination Models and Languages (Coordination'08). ed. / Doug Lea; Gianluigi Zavattaro. Germany : Springer, 2008. p. 153-168 (Lecture Notes in Computer Science; No. 5052).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  131. Published

    A Formal Analysis of Complex Type Flaw Attacks on Security Protocols. / Gao, Han; Bodei, Chiara; Degano, Pierpaolo.

    Lecture Notes in Computer Science. Vol. 5140 Springer, 2008. p. 167-183.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  132. Published

    An extensible analysable system model. / Probst, Christian W.; Hansen, Rene Rydhof.

    In: Information Security Technical Report, Vol. 13, No. 4, 2008, p. 235-246.

    Publication: Research - peer-reviewJournal article – Annual report year: 2008

  133. Published

    Countering Insider Threats. / Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter; Bishop, Matt.

    Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, 2008. (Dagstuhl Seminar Proceedings; No. 08302).

    Publication: ResearchReport – Annual report year: 2008

  134. Published

    From Flow Logic to Static Type Systems in Coordination Languages. / De Nicola, Rocco; Gorla, Daniele; Hansen, René Rydhof; Nielson, Flemming; Nielson, Hanne Riis; Probst, Christian W.; Pugliese, Rosario.

    Coordination Models and Languages: 10th International Conference, COORDINATION 2008. Vol. 5052 Springer, 2008. p. 100-116 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  135. Published

    From generic to specific: off-line optimization for a general constraint solver. / Zhang, Ye; Amtoft, Torben; Nielson, Flemming.

    Proceedings of the ACM SIGPLAN Seventh International Conference on Generative Programming and Component Engineering. ACM, 2008. p. 45-54.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  136. Published

    Goal-oriented Composition of Services. / Nanz, Sebastian; Tolstrup, Terkel Kristian.

    Proceedings of the 7th International Symposium on Software Composition (SC'08). Springer, 2008. p. 109-124 (Lecture Notes in Computer Science; No. 4954).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  137. Published

    Iterative Specialisation of Horn Clauses. / Nielsen, Christoffer Rosenkilde; Nielson, Flemming; Nielson, Hanne Riis.

    Lecture Notes in Computer Science. Vol. Volume 4960 Springer, 2008. p. 131-145.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  138. Published

    Java bytecode verification via static single assignment form. / Gal, Andreas; Probst, Christian W.; Franz, Michael.

    In: ACM Transactions on Programming Languages and Systems, Vol. 30, No. 4, 2008, p. 1-21.

    Publication: Research - peer-reviewJournal article – Annual report year: 2008

  139. Published

    Modal Abstractions of Concurrent Behaviour. / Nanz, Sebastian; Nielson, Flemming; Nielson, Hanne Riis.

    Static Analysis: 15th International Symposium, SAS 2008, Valencia, Spain, July 16-18, 2008. Proceedings. Vol. 5079 Springer Science+Business Media B.V., 2008. p. 159-173 (Lecture Notes in Computer Science; No. 5079).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  140. Published

    Pathway Analysis for BioAmbients. / Pilegaard, Henrik; Nielson, Flemming; Nielson, Hanne Riis.

    In: Journal of Logic and Algebraic Programming, Vol. 77, No. 1-2, 2008, p. 92-130.

    Publication: Research - peer-reviewJournal article – Annual report year: 2008

  141. Published

    Proceedings of The 13. Nordic Workshop on Secure IT Systems, NordSec 2008, Kongens Lyngby Oct 9-10, 2008. / Nielson, Hanne Riis (Editor); Probst, Christian W. (Editor).

    Kgs. Lyngby : Technical University of Denmark, DTU Informatics, Building 321, 2008. (IMM-Technical Report-2008-14).

    Publication: ResearchReport – Annual report year: 2008

  142. Published
  143. Published

    Relational Analysis of Correlation. / Bauer, Jörg; Nielson, Flemming; Nielson, Hanne Riis; Pilegaard, Henrik.

    Static Analysis: Proceedings of 15th International Symposium, SAS 2008. ed. / María Alpuente; Germán Vidal. Springer, 2008. p. 32-46 (Lecture Notes in Computer Science; No. 5079).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  144. Published

    Static validation of licence conformance policies. / Hansen, Rene Rydhof; Nielson, Flemming; Nielson, Hanne Riis; Probst, Christian W.

    Proceedings of the 3rd International Conference on Availability, Reliability, and Security. IEEE Computer Society Press, 2008. p. 1104-1111.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  145. Published

    ZigBee-2007 Security Essentials. / Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming.

    Proceedings of the 13th Nordic Workshop on Secure IT Systems: NordSec 2008. ISSN 1601-2321. ed. Denmark : Technical University of Denmark, DTU Informatics, Building 321, 2008. p. 65-82.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  146. 2007
  147. Published

    Language Based Techniques for Systems Biology. / Pilegaard, Henrik; Nielson, Flemming (Supervisor); Nielson, Hanne Riis (Supervisor).

    Kgs. Lyngby : Technical University of Denmark, DTU Informatics, Building 321, 2007. (IMM-PHD-2008-184).

    Publication: ResearchPh.D. thesis – Annual report year: 2007

  148. Published

    Language-based Security for VHDL. / Tolstrup, Terkel Kristian; Nielson, Hanne Riis (Supervisor); Nielson, Flemming (Supervisor).

    2007. (IMM-PHD; No. 174).

    Publication: ResearchPh.D. thesis – Annual report year: 2007

  149. Published

    Active Evaluation Contexts for Reaction Semantics. / Pilegaard, Henrik; Nielson, Flemming; Nielson, Hanne Riis.

    Electronic Notes in Theoretical Computer Science. Vol. 175 Elsevier, 2007. p. 57-70.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  150. Published

    A formal analysis for capturing replay attacks in cryptographic protocols. / Gao, Han; Bodei, Chiara; Degano, Pierpaolo; Nielson, Hanne Riis.

    12th Asian Computing Science Conference, ASIAN 2007: Lecture Notes in Computer Science. Vol. 4846 Springer, 2007. p. 150-165.

    Publication: ResearchArticle in proceedings – Annual report year: 2007

  151. Published

    Analyzing the Control Structure of PEPA. / Yang, Fan; Nielson, Hanne Riis.

    2007. Poster session presented at The 14th International Static Analysis Symposium (SAS 2007), Lyngby, Denmark, .

    Publication: ResearchPoster – Annual report year: 2007

  152. Published

    A new way of estimating compute-boundedness and its application to dynamic voltage scaling. / Venkatachalam, Vasanth; Franz, Michael; Probst, Christian W.

    In: International Journal of Embedded Systems, Vol. 3, No. 1-2, 2007, p. 17-30.

    Publication: Research - peer-reviewJournal article – Annual report year: 2007

  153. Published

    A Scalable Inclusion Constraint Solver Using Unification. / Zhang, Ye; Nielson, Flemming.

    Proceedings of the 17th International Symposium on Logic-Based Program Symthesis and Transformation. Springer-Verlag, 2007. p. 121-137 (Lecture Notes in Computer Science; No. 4915).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  154. Published

    Cryptographic Pattern Matching. / Nielsen, Christoffer Rosenkilde; Nielson, Flemming; Nielson, Hanne Riis.

    In: Electronic Notes in Theoretical Computer Science, Vol. 168, 2007, p. 91-107.

    Publication: Research - peer-reviewConference article – Annual report year: 2007

  155. Published

    Detecting and Preventing Type Flaws: a Control Flow Analysis with Tags. / Bodei, Chiara; Degano, Pierpaolo; Gao, Han; Brodo, Linda.

    Electronic Notes in Theoretical Computer Science. Vol. 194 2007. p. 3-22.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  156. Published

    Static Analysis : 14th International Symposium, SAS 2007, Kgs. Lyngby, Denmark, August 22-24, proceedings. / Nielson, Hanne Riis (Editor); Filé, Gilberto (Editor).

    Springer, 2007. (Lecture Notes in Computer Science; No. 4634).

    Publication: Research - peer-reviewBook – Annual report year: 2007

  157. 2006
  158. Published

    A Framework for Security Analysis of Mobile Wireless Networks. / Nanz, Sebastian; Hankin, Chris.

    In: Theoretical Computer Science, Vol. 367, No. 1-2, 2006, p. 203-227.

    Publication: Research - peer-reviewJournal article – Annual report year: 2006

  159. Published

    Analysis of LYSA-calculus with explicit confidentiality annotations. / Gao, Han; Nielson, Hanne Riis.

    Proceeding of 20th International Conference on Advanced Information Networking and Applications. Vol. 2 IEEE, 2006. p. 39-43.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  160. Published

    Formal Security Analysis for Ad-Hoc Networks. / Nanz, Sebastian; Hankin, Chris.

    Proceedings of the 2004 Workshop on Views on Designing Complex Architectures (VODCA'04). Elsevier, 2006. (Electronic Notes in Theoretical Computer Science; No. 142).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2004

  161. Published

    Issues in holistic system design. / Lawall, Julia L.; Probst, Christian W.; Schultz, Ulrik Pagh.

    Proceedings of the 3rd workshop on programming languages and operating systems. 2006.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2006

  162. Published

    Non-Interference and Erasure Policies for Java Card Bytecode.. / Hansen, René Rydhof; Probst, Christian W.

    6th International Workshop on Issues in the Theory of Security (WITS '06). 2006.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2006

  163. Published

    Program Partitioning using Dynamic Trust Models. / Søndergaard, Dan; Probst, Christian W.; Jensen, Christian D.; Hansen, René Rydhof.

    Workshop on Formal Aspects in Security and Trust (FAST 2006). 2006.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2006

  164. Published

    Sandboxing for myKlaim. / Hansen, René Rydhof; Probst, Christian W.; Nielson, Flemming.

    The First International Conference on Availability, Reliability and Security (ARES 2006). 2006.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2006

  165. Published

    Static analysis for blinding. / Nielsen, Christoffer Rosenkilde; Nielson, Hanne Riis.

    In: Nordic Journal of Computing, Vol. 13, No. 1, 2006, p. 98 - 116.

    Publication: Research - peer-reviewJournal article – Annual report year: 2006

  166. Published

    Where can an Insider attack?. / Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming.

    Workshop on Formal Aspects in Security and Trust (FAST 2006). Springer, 2006.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2006

  167. Published

    Working Groups’ Report: The Challenge of Combining Simulation and Verification. / Batt, Gregory; Bradley, Jeremy; Ewald, Roland; Fages, Francois; Nielson, Flemming.

    Simulation and Verification of Dynamic Systems. 2006. (Dagstuhl Seminar Proceedings 06161).

    Publication: ResearchArticle in proceedings – Annual report year: 2006

  168. 2005
  169. Published

    A portable virtual machine target for proof-carrying code. / Franz, Michael; Chandra, Deepak; Gal, Andreas; Haldar, Vivek; Probst, Christian W.; Reig, Fermin; Wang, Ning.

    In: Science of Computer Programming, Vol. 57, No. 3, 2005, p. 275-294.

    Publication: Research - peer-reviewJournal article – Annual report year: 2005

  170. Published

    Flow logic for language-based safety and security. / Hansen, René Rydhof; Nielson, Flemming (Supervisor).

    2005. (IMM-PHD-2005-143).

    Publication: ResearchPh.D. thesis – Annual report year: 2005

  171. 2004
  172. Published

    Automated Analysis of Security in Networking Systems. / Buchholtz, Mikael; Nielson, Hanne Riis (Supervisor); Nielson, Flemming (Supervisor).

    2004. (IMM-PHD-2004-141).

    Publication: ResearchPh.D. thesis – Annual report year: 2004

  173. Published

    Cryptographic Analysis in Cubic Time. / Nielson, Flemming; Nielson, Hanne Riis; Seidl, H.

    In: Electronic Notes in Theoretical Computer Science, Vol. 62, No. 17, 2004, p. 1.

    Publication: Research - peer-reviewJournal article – Annual report year: 2004

  174. Published

    Prototyping Proof-Carrying Code. / Wildmoser, Martin; Nipkow, Tobias; Klein, Gerwin; Nanz, Sebastian.

    Proceedings of the 3rd IFIP International Conference on Theoretical Computer Science (TCS'04). 2004.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2004

  175. Published

    Spatial Analysis of BioAmbients. / Nielson, Hanne Riis; Nielson, Flemming; Pilegaard, Henrik.

    Proceedings of Static Analysis Symposium 2004 (SAS'04). Springer Verlag, 2004. p. 69-83.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2004

  176. Published

    Static Analysis of Routing Protocols for Ad-Hoc Networks. / Nanz, Sebastian; Hankin, Chris.

    Proceedings of the 2004 ACM SIGPLAN and IFIP WG 1.7 Workshop on Issues in the Theory of Security (WITS'04). 2004.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2004

  177. 2002
  178. Published

    Modular Control Flow Analysis for Libraries. / Probst, Christian W.

    Proceedings of the 9th International Symposium on Static Analysis. 2002.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2002

Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word