Author of the publication

A Probabilistic Analysis Framework for Malicious Insider Threats.

, , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 178-189. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ready to preorder: The case of weak process semantics., , and . Inf. Process. Lett., 109 (2): 104-111 (2008)EasyBC: A Cryptography-Specific Language for Security Analysis of Block Ciphers against Differential Cryptanalysis., , , and . Proc. ACM Program. Lang., 8 (POPL): 848-881 (January 2024)Tractability of Separation Logic with Inductive Definitions: Beyond Lists., , and . CONCUR, volume 85 of LIPIcs, page 37:1-37:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Orbit Problem Revisited, , and . CoRR, (2013)On Finite Alphabets and Infinite Bases II: Completed and Ready Simulation., , and . FoSSaCS, volume 3921 of Lecture Notes in Computer Science, page 1-15. Springer, (2006)On the Axiomatizability of Impossible Futures., , and . Logical Methods in Computer Science, (2015)Augmenting Bug Localization with Part-of-Speech and Invocation., , , and . International Journal of Software Engineering and Knowledge Engineering, 27 (6): 925-950 (2017)Making Agents' Abilities Explicit., , and . IEEE Access, (2019)On Finite Alphabets and Infinite Bases III: Simulation., and . CONCUR, volume 4137 of Lecture Notes in Computer Science, page 421-434. Springer, (2006)Model-based Automated Testing of JavaScript Web Applications via Longer Test Sequences., , , , and . CoRR, (2019)