-
1Report
-
2Academic Journal
المساهمون: Varga, Pal, Granville, Lisandro Zambenedetti, Galis, Alex, Godor, Istvan, Limam, Noura, Chemouil, Prosper, Francois, Jerome, Pahl, Marc-Oliver
المصدر: Hageman , K , Kidmose , E , Hansen , R R & Pedersen , J M 2022 , Understanding the Challenges of Blocking Unnamed Network Traffic. in P Varga , L Z Granville , A Galis , I Godor , N Limam , P Chemouil , J Francois & M-O Pahl (eds) , NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium : Network and Service Management in the Era of Cloudification, Softwarization and Artificial Intelligence, NOMS 2022 . , 9789854 , IEEE (Institute of Electrical and Electronics Engineers) , IEEE/IFIP Network Operations and Management Symposium , pp. 1-5 ....
مصطلحات موضوعية: DNS, network flows, network security, unnamed traffic
وصف الملف: application/pdf
-
3Academic Journal
المصدر: Schlichtkrull , A , Hansen , R R & Nielson , F 2024 , Isabelle-verified correctness of Datalog programs for program analysis. in Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, SAC 2024, Avila, Spain, April 8-12, 2024 . Association for Computing Machinery (ACM) , pp. 1731-1734 , SAC '24: 39th ACM/SIGAPP Symposium on Applied Computing , Avila , Spain , 08/04/2024 . https://doi.org/10.1145/3605098.3636091
مصطلحات موضوعية: datalog, formal methods, isabelle, static analysis
Relation: urn:ISBN:9798400702433
-
4Book
المؤلفون: Nielson, Flemming, Hansen, René Rydhof, Nielson, Hanne Riis
المصدر: Nielson , F , Hansen , R R & Nielson , H R 2020 , Adaptive Security Policies . in Engineering Principles . Springer , Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol. 12477 , pp. 280-294 , International Symposium On Leveraging Applications of Formal Methods, Verification and Validation 2020 , Greece , 20/10/2020 . https://doi.org/10.1007/978-3-030-61470-6_17
وصف الملف: application/pdf
Relation: https://orbit.dtu.dk/en/publications/8015476b-6bd7-4650-87f3-ac22bab59715; urn:ISBN:978-3-030-61469-0
-
5Academic Journal
المساهمون: di Vimercati, Sabrina De Capitani, Samarati, Pierangela
المصدر: Hageman , K , Kidmose , E , Hansen , R R & Pedersen , J M 2021 , Can a TLS certificate be phishy? in S D C di Vimercati & P Samarati (eds) , Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021 . SciTePress , International Conference on Security and Cryptography - SECRYPT - Proceedings , pp. 38-49 , 18th International Conference on Security and Cryptography, SECRYPT 2021 , Virtual, Online , 06/07/2021 . https://doi.org/10.5220/0010516600380049
مصطلحات موضوعية: Certificate Transparency, Digital Certificate, Phishing, TLS
وصف الملف: application/pdf
-
6Academic Journal
المصدر: Panum , T K , Hageman , K , Hansen , R R & Pedersen , J M 2020 , Towards Adversarial Phishing Detection . in 13th USENIX Workshop on Cyber Security Experimentation and Test . USENIX - The Advanced Computing Systems Association , 13th USENIX Workshop on Cyber Security Experimentation and Test , 10/08/2020 . < https://www.usenix.org/system/files/cset20-paper-panum.pdf >
وصف الملف: application/pdf
Relation: urn:ISBN:9781713815211
الاتاحة: https://vbn.aau.dk/da/publications/d3c67244-39c9-4433-ae13-9bdbd52fc2cb
https://vbn.aau.dk/ws/files/394273261/Open_Access_Article.pdf
https://www.usenix.org/conference/cset20/presentation/panum
https://www.usenix.org/conference/cset20/workshop-program
http://www.proceedings.com/55598.html
https://www.usenix.org/system/files/cset20-paper-panum.pdf -
7Academic Journal
المؤلفون: Dharanikota, Samvid, Jensen, Michael Toft, Kristensen, Sebastian Rom, Michno, Mathias Sass, Pignolet, Yvonne Anne, Hansen, René Rydhof, Schmid, Stefan
المصدر: Dharanikota , S , Jensen , M T , Kristensen , S R , Michno , M S , Pignolet , Y A , Hansen , R R & Schmid , S 2020 , ' Breeding unicorns : Developing trustworthy and scalable randomness beacons ' , PLOS ONE , vol. 15 , no. 4 , e0232261 . https://doi.org/10.1371/journal.pone.0232261
وصف الملف: application/pdf
-
8Academic Journal
المؤلفون: Spencer, Matt, Coles-Kemp, Lizzie, Hansen, René Rydhof
المصدر: Journal of Cybersecurity; 2024, Vol. 10 Issue 1, p1-17, 17p
مصطلحات موضوعية: INFORMATION technology security, SOCIAL theory, PHILOSOPHY of science, PHILOSOPHICAL literature, INTERNET security
-
9Book
المؤلفون: Arora, Shiraj, Hansen, René Rydhof, Larsen, Kim Guldstrand, Legay, Axel, Poulsen, Danny Bøgsted
المصدر: Model Checking Software ; Lecture Notes in Computer Science ; page 61-78 ; ISSN 0302-9743 1611-3349 ; ISBN 9783031150760 9783031150777
-
10Conference
المؤلفون: Slesinger, Ian, Coles-Kemp, Lizzie, Panteli, Niki, Hansen, Rene Rydhof
المساهمون: ESRC
المصدر: Proceedings of the 2022 New Security Paradigms Workshop
-
11Academic Journal
المؤلفون: Hansen, Rene Rydhof, Jensen, Peter Gjøl, Larsen, Kim Guldstrand, Legay, Axel, Poulsen, Danny Bøgsted
المصدر: Hansen , R R , Jensen , P G , Larsen , K G , Legay , A & Poulsen , D B 2017 , Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata . in Graphical Models for Security : 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers . Springer , Lecture Notes in Computer Science , pp. 75-90 , International Workshop on Graphical Models for Security , Santa Barbara , California , United States , 21/08/2017 . https://doi.org/10.1007/978-3-319-74860-3_5
-
12Book
المؤلفون: Nielson, Flemming, Hansen, René Rydhof, Nielson, Hanne Riis
المساهمون: Dougherty, Daniel, Meseguer, José, Mödersheim, Sebastian Alexander, Rowe, Paul
المصدر: Nielson , F , Hansen , R R & Nielson , H R 2021 , Benign Interaction of Security Domains . in D Dougherty , J Meseguer , S A Mödersheim & P Rowe (eds) , Protocols, Strands, and Logic : Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday . Springer , Lecture Notes in Computer Science , vol. 13066 , pp. 312-331 . https://doi.org/10.1007/978-3-030-91631-2_17
Relation: https://orbit.dtu.dk/en/publications/11e6d445-738c-4e42-8427-b678f60d6d1c; urn:ISBN:978-3-030-91630-5
-
13Book
المؤلفون: Møller, Bjarke Hilmer, Søndergaard, Jacob Gosch, Jensen, Kristoffer Skagbæk, Pedersen, Magnus Winkel, Bøgedal, Tobias Worm, Christensen, Anton, Poulsen, Danny Bøgsted, Larsen, Kim Guldstrand, Hansen, René Rydhof, Jensen, Thomas Rosted, Madsen, Heino Juvoll, Uhrenfeldt, Henrik
المصدر: Secure IT Systems ; Lecture Notes in Computer Science ; page 192-211 ; ISSN 0302-9743 1611-3349 ; ISBN 9783030916244 9783030916251
-
14Book
المؤلفون: Hageman, Kaspar, Hansen, René Rydhof, Pedersen, Jens Myrup
المصدر: Secure IT Systems ; Lecture Notes in Computer Science ; page 133-152 ; ISSN 0302-9743 1611-3349 ; ISBN 9783030916244 9783030916251
-
15Conference
المصدر: Proceedings of the 22nd International Conference on Distributed Computing and Networking
-
16Academic Journal
المؤلفون: Schoeberl, Martin, Dalsgaard, Andreas Engelbredt, Hansen, René Rydhof, Korsholm, Stephan E., Ravn, Anders P., Rios Rivas, Juan Ricardo, Strøm, Torur Biskopstø, Søndergaard, Hans, Wellings, Andy, Zhao, Shuai
المصدر: Schoeberl , M , Dalsgaard , A E , Hansen , R R , Korsholm , S E , Ravn , A P , Rios Rivas , J R , Strøm , T B , Søndergaard , H , Wellings , A & Zhao , S 2016 , ' Safety-critical Java for embedded systems ' , Concurrency and Computation: Practice & Experience . https://doi.org/10.1002/cpe.3963
مصطلحات موضوعية: Safety-critical Java, Real-time systems, Embedded systems
وصف الملف: application/pdf
-
17Academic Journal
المؤلفون: Ivanova, Marieta Georgieva, Probst, Christian W., Hansen, Rene Rydhof, Kammüller, Florian
المصدر: Ivanova , M G , Probst , C W , Hansen , R R & Kammüller , F 2016 , Transforming Graphical System Models to Graphical Attack Models . in Revised Selected Papers from the 2nd International Workshop on Graphical Models for Security (GraMSec 2015) . Springer , Lecture Notes in Computer Science , vol. 9390 , pp. 82-96 , The Second International Workshop on Graphical Models for Security , Verona , Italy , 13/07/2015 . https://doi.org/10.1007/978-3-319-29968-6_6
وصف الملف: application/pdf
Relation: https://orbit.dtu.dk/en/publications/1d14c870-0a0a-46eb-885c-d4f395a75c44; urn:ISBN:978-3-319-29967-9
-
18Academic Journal
المساهمون: Probst, Christian W., Hankin, Chris, Rydhof Hansen, René
المصدر: Probst , C W , Kammüller , F & Hansen , R R 2016 , Formal modelling and analysis of socio-technical systems . in C W Probst , C Hankin & R Rydhof Hansen (eds) , Semantics, Logics, and Calculi : Essays Dedicated to Hanne Riis Nielson and Flemming Nielson on the Occasion of Their 60th Birthdays . Springer , Lecture Notes in Computer Science , vol. 9560 , pp. 54-73 . https://doi.org/10.1007/978-3-319-27810-0_3
وصف الملف: application/pdf
Relation: https://orbit.dtu.dk/en/publications/ab39dfa8-03e3-4aca-b2ee-23741bece5b8; urn:ISBN:978-3-319-27809-4
-
19Conference
المصدر: Wadern : Schloss Dagstuhl - Leibniz-Zentrum für Informatik, OASIcs - OpenAccess Series in Informatics 24, 32-43 (2012). doi:10.4230/OASIcs.SSV.2011.32 ; 6th International Workshop on Systems Software Verification (SSV 2011) [Elektronische Ressource] / Hrsg.: Jörg Brauer ; Marco Roveri ; Hendrik Tews ; Hendrik Tews 6. International Workshop on Systems Software Verification
جغرافية الموضوع: DE
Relation: info:eu-repo/semantics/altIdentifier/issn/2190-6807; info:eu-repo/semantics/altIdentifier/isbn/978-3-939897-36-1; https://publications.rwth-aachen.de/record/128784; https://publications.rwth-aachen.de/search?p=id:%22RWTH-CONV-198838%22
-
20Academic Journal
المؤلفون: Cassez, Franck, Hansen, René Rydhof, Olesen, Mads Chr.
المساهمون: Franck Cassez and René Rydhof Hansen and Mads Chr. Olesen
مصطلحات موضوعية: Timing anomalies, worst case execution time (WCET), abstractions
وصف الملف: application/pdf
Relation: Is Part Of OASIcs, Volume 23, 12th International Workshop on Worst-Case Execution Time Analysis (2012); https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.WCET.2012.1