暂无分享,去创建一个
[1] Florian Kammüller,et al. Applying the Isabelle Insider Framework to Airplane Security , 2020, Sci. Comput. Program..
[2] Florian Kammuller,et al. A Formal Development Cycle for Security Engineering in Isabelle , 2020, ArXiv.
[3] Florian Kammüller,et al. Attack trees in Isabelle extended with probabilities for quantum cryptography , 2019, Comput. Secur..
[4] Florian Kammuller,et al. QKD in Isabelle - Bayesian Calculation , 2019, ArXiv.
[5] Florian Kammüller,et al. Combining Secure System Design with Risk Assessment for IoT Healthcare Systems , 2019, 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[6] Florian Kammüller,et al. Formal Modeling and Analysis of Data Protection for GDPR Compliance of IoT Healthcare Systems , 2018, 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[7] Florian Kammuller,et al. Attack Trees in Isabelle , 2018, 1803.06494.
[8] S. Furnell,et al. A toolkit approach to information security awareness and education , 2017 .
[9] Florian Kammüller,et al. A Proof Calculus for Attack Trees in Isabelle , 2017, DPM/CBT@ESORICS.
[10] Florian Kammüller,et al. Human Centric Security and Privacy for the IoT Using Formal Techniques , 2017, AHFE.
[11] Florian Kammüller,et al. Modeling and Verification of Insider Threats Using Logical Analysis , 2017, IEEE Systems Journal.
[12] Florian Kammueller,et al. Towards Formal Analysis of Insider Threats for Auctions , 2016, MIST@CCS.
[13] Florian Kammüller,et al. Investigating Airplane Safety and Security Against Insider Threats Using Logical Modeling , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[14] Giuseppe Primiero,et al. Modeling Human Behaviour with Higher Order Logic: Insider Threats , 2014, 2014 Workshop on Socio-Technical Aspects in Security and Trust.
[15] Jason R. C. Nurse,et al. Cyber Security Awareness Campaigns: Why do they fail to change behaviour? , 2014, ArXiv.
[16] Sadie Creese,et al. Understanding Insider Threat: A Framework for Characterising Attacks , 2014, 2014 IEEE Security and Privacy Workshops.
[17] Florian Kammüller,et al. Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis , 2014, 2014 IEEE Security and Privacy Workshops.
[18] Florian Kammüller,et al. Invalidating Policies using Structural Information , 2013, 2013 IEEE Security and Privacy Workshops.
[19] Dawn M. Cappelli,et al. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .
[20] Aubrey Labuschagne,et al. Design of cyber security awareness game utilizing a social media framework , 2011, 2011 Information Security for South Africa.
[21] Elmarie Kritzinger,et al. Cyber security for home users: A new way of protection through awareness enforcement , 2010, Comput. Secur..
[22] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[23] David Lacey,et al. Managing the Human Factor in Information Security: How to win over staff and influence business managers , 2009 .
[24] Susan B. Barnes,et al. A privacy paradox: Social networking in the United States , 2006, First Monday.
[25] Hennie A. Kruger,et al. A prototype for assessing information security awareness , 2006, Comput. Secur..
[26] Florian Kammüller,et al. Locales - A Sectioning Concept for Isabelle , 1999, TPHOLs.
[27] Andrew C. Myers,et al. Complete, safe information flow with decentralized labels , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[28] Lawrence C. Paulson,et al. Proving properties of security protocols by induction , 1997, Proceedings 10th Computer Security Foundations Workshop.
[29] M. Schäfers,et al. Wirtschaft und Gesellschaft , 1988 .
[30] G. Homans,et al. Social Behaviour, Its Elementary Forms , 1962 .
[31] C. Hempel,et al. Studies in the Logic of Explanation , 1948, Philosophy of Science.
[32] Uwe Nestmann,et al. Inter-Blockchain Protocols with the Isabelle Infrastructure Framework , 2020, FMBC@CAV.
[33] Florian Kammüller,et al. Modeling and Analyzing the Corona-Virus Warning App with the Isabelle Infrastructure Framework , 2020, DPM/CBT@ESORICS.
[34] W. Hager,et al. and s , 2019, Shallow Water Hydraulics.
[35] M. Bishop,et al. Inside the Insider Threat (Introduction) , 2016 .
[36] Yoshimichi Sato. Rational choice theory , 2013 .
[37] W. Marsden. I and J , 2012 .
[38] H. Esser,et al. Soziologie : Allgemeine Grundlagen , 1999 .
[39] Paul Weirich,et al. The Cement of Society , 1992 .
[40] Maximilian Weber,et al. Wirtschaft und Gesellschaft : Grundriss der verstehenden Soziologie , 1976 .