يعرض 1 - 20 نتائج من 322 نتيجة بحث عن '"Hansen, René Rydhof"', وقت الاستعلام: 0.55s تنقيح النتائج
  1. 1
    Report
  2. 2
    Academic Journal

    المساهمون: Varga, Pal, Granville, Lisandro Zambenedetti, Galis, Alex, Godor, Istvan, Limam, Noura, Chemouil, Prosper, Francois, Jerome, Pahl, Marc-Oliver

    المصدر: Hageman , K , Kidmose , E , Hansen , R R & Pedersen , J M 2022 , Understanding the Challenges of Blocking Unnamed Network Traffic. in P Varga , L Z Granville , A Galis , I Godor , N Limam , P Chemouil , J Francois & M-O Pahl (eds) , NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium : Network and Service Management in the Era of Cloudification, Softwarization and Artificial Intelligence, NOMS 2022 . , 9789854 , IEEE (Institute of Electrical and Electronics Engineers) , IEEE/IFIP Network Operations and Management Symposium , pp. 1-5 ....

    مصطلحات موضوعية: DNS, network flows, network security, unnamed traffic

    وصف الملف: application/pdf

  3. 3
    Academic Journal

    المصدر: Schlichtkrull , A , Hansen , R R & Nielson , F 2024 , Isabelle-verified correctness of Datalog programs for program analysis. in Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, SAC 2024, Avila, Spain, April 8-12, 2024 . Association for Computing Machinery (ACM) , pp. 1731-1734 , SAC '24: 39th ACM/SIGAPP Symposium on Applied Computing , Avila , Spain , 08/04/2024 . https://doi.org/10.1145/3605098.3636091

    مصطلحات موضوعية: datalog, formal methods, isabelle, static analysis

    Relation: urn:ISBN:9798400702433

  4. 4
    Book

    المصدر: Nielson , F , Hansen , R R & Nielson , H R 2020 , Adaptive Security Policies . in Engineering Principles . Springer , Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol. 12477 , pp. 280-294 , International Symposium On Leveraging Applications of Formal Methods, Verification and Validation 2020 , Greece , 20/10/2020 . https://doi.org/10.1007/978-3-030-61470-6_17

    وصف الملف: application/pdf

  5. 5
    Academic Journal

    المساهمون: di Vimercati, Sabrina De Capitani, Samarati, Pierangela

    المصدر: Hageman , K , Kidmose , E , Hansen , R R & Pedersen , J M 2021 , Can a TLS certificate be phishy? in S D C di Vimercati & P Samarati (eds) , Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021 . SciTePress , International Conference on Security and Cryptography - SECRYPT - Proceedings , pp. 38-49 , 18th International Conference on Security and Cryptography, SECRYPT 2021 , Virtual, Online , 06/07/2021 . https://doi.org/10.5220/0010516600380049

    مصطلحات موضوعية: Certificate Transparency, Digital Certificate, Phishing, TLS

    وصف الملف: application/pdf

  6. 6
    Academic Journal

    المصدر: Panum , T K , Hageman , K , Hansen , R R & Pedersen , J M 2020 , Towards Adversarial Phishing Detection . in 13th USENIX Workshop on Cyber Security Experimentation and Test . USENIX - The Advanced Computing Systems Association , 13th USENIX Workshop on Cyber Security Experimentation and Test , 10/08/2020 . < https://www.usenix.org/system/files/cset20-paper-panum.pdf >

    وصف الملف: application/pdf

    Relation: urn:ISBN:9781713815211

  7. 7
    Academic Journal
  8. 8
    Academic Journal
  9. 9
    Book
  10. 10
    Conference
  11. 11
    Academic Journal

    المصدر: Hansen , R R , Jensen , P G , Larsen , K G , Legay , A & Poulsen , D B 2017 , Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata . in Graphical Models for Security : 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers . Springer , Lecture Notes in Computer Science , pp. 75-90 , International Workshop on Graphical Models for Security , Santa Barbara , California , United States , 21/08/2017 . https://doi.org/10.1007/978-3-319-74860-3_5

  12. 12
    Book

    المساهمون: Dougherty, Daniel, Meseguer, José, Mödersheim, Sebastian Alexander, Rowe, Paul

    المصدر: Nielson , F , Hansen , R R & Nielson , H R 2021 , Benign Interaction of Security Domains . in D Dougherty , J Meseguer , S A Mödersheim & P Rowe (eds) , Protocols, Strands, and Logic : Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday . Springer , Lecture Notes in Computer Science , vol. 13066 , pp. 312-331 . https://doi.org/10.1007/978-3-030-91631-2_17

  13. 13
    Book
  14. 14
    Book

    المصدر: Secure IT Systems ; Lecture Notes in Computer Science ; page 133-152 ; ISSN 0302-9743 1611-3349 ; ISBN 9783030916244 9783030916251

  15. 15
    Conference
  16. 16
    Academic Journal

    المصدر: Schoeberl , M , Dalsgaard , A E , Hansen , R R , Korsholm , S E , Ravn , A P , Rios Rivas , J R , Strøm , T B , Søndergaard , H , Wellings , A & Zhao , S 2016 , ' Safety-critical Java for embedded systems ' , Concurrency and Computation: Practice & Experience . https://doi.org/10.1002/cpe.3963

    مصطلحات موضوعية: Safety-critical Java, Real-time systems, Embedded systems

    وصف الملف: application/pdf

  17. 17
    Academic Journal

    المصدر: Ivanova , M G , Probst , C W , Hansen , R R & Kammüller , F 2016 , Transforming Graphical System Models to Graphical Attack Models . in Revised Selected Papers from the 2nd International Workshop on Graphical Models for Security (GraMSec 2015) . Springer , Lecture Notes in Computer Science , vol. 9390 , pp. 82-96 , The Second International Workshop on Graphical Models for Security , Verona , Italy , 13/07/2015 . https://doi.org/10.1007/978-3-319-29968-6_6

    وصف الملف: application/pdf

  18. 18
    Academic Journal

    المساهمون: Probst, Christian W., Hankin, Chris, Rydhof Hansen, René

    المصدر: Probst , C W , Kammüller , F & Hansen , R R 2016 , Formal modelling and analysis of socio-technical systems . in C W Probst , C Hankin & R Rydhof Hansen (eds) , Semantics, Logics, and Calculi : Essays Dedicated to Hanne Riis Nielson and Flemming Nielson on the Occasion of Their 60th Birthdays . Springer , Lecture Notes in Computer Science , vol. 9560 , pp. 54-73 . https://doi.org/10.1007/978-3-319-27810-0_3

    وصف الملف: application/pdf

  19. 19
    Conference

    المصدر: Wadern : Schloss Dagstuhl - Leibniz-Zentrum für Informatik, OASIcs - OpenAccess Series in Informatics 24, 32-43 (2012). doi:10.4230/OASIcs.SSV.2011.32 ; 6th International Workshop on Systems Software Verification (SSV 2011) [Elektronische Ressource] / Hrsg.: Jörg Brauer ; Marco Roveri ; Hendrik Tews ; Hendrik Tews 6. International Workshop on Systems Software Verification

    جغرافية الموضوع: DE

    Relation: info:eu-repo/semantics/altIdentifier/issn/2190-6807; info:eu-repo/semantics/altIdentifier/isbn/978-3-939897-36-1; https://publications.rwth-aachen.de/record/128784; https://publications.rwth-aachen.de/search?p=id:%22RWTH-CONV-198838%22

  20. 20
    Academic Journal

    المساهمون: Franck Cassez and René Rydhof Hansen and Mads Chr. Olesen

    وصف الملف: application/pdf

    Relation: Is Part Of OASIcs, Volume 23, 12th International Workshop on Worst-Case Execution Time Analysis (2012); https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.WCET.2012.1