Locales a sectioning concept for Isabelle F Kammüller, M Wenzel, LC Paulson Theorem Proving in Higher Order Logics: 12th International Conference …, 1999 | 159 | 1999 |
Modeling and verification of insider threats using logical analysis F Kammüller, CW Probst IEEE systems journal 11 (2), 534-545, 2015 | 47 | 2015 |
A formal proof of sylow's theorem F Kammüller, LC Paulson Journal of Automated Reasoning 23, 235-264, 1999 | 47 | 1999 |
Transforming graphical system models to graphical attack models MG Ivanova, CW Probst, RR Hansen, F Kammüller Graphical Models for Security: Second International Workshop, GraMSec 2015 …, 2016 | 46 | 2016 |
Encoding object-z in isabelle/hol G Smith, F Kammüller, T Santen ZB 2002: Formal Specification and Development in Z and B: 2nd International …, 2002 | 44 | 2002 |
Invalidating policies using structural information F Kammüller, CW Probst 2013 IEEE Security and Privacy Workshops, 76-81, 2013 | 42 | 2013 |
Attack tree analysis for insider threats on the IoT using Isabelle F Kammüller, JRC Nurse, CW Probst Human Aspects of Information Security, Privacy, and Trust: 4th International …, 2016 | 39 | 2016 |
Modular reasoning in Isabelle F Kammüller International Conference on Automated Deduction, 99-114, 2000 | 39 | 2000 |
Formal modeling and analysis of data protection for gdpr compliance of iot healthcare systems F Kammueller 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2018 | 35 | 2018 |
Formalization of quantum protocols using Coq J Boender, F Kammüller, R Nagarajan arXiv preprint arXiv:1511.01568, 2015 | 34 | 2015 |
Attack tree generation by policy invalidation MG Ivanova, CW Probst, RR Hansen, F Kammüller Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015 | 34 | 2015 |
Combining generated data models with formal invalidation for insider threat analysis F Kammüller, CW Probst 2014 IEEE Security and Privacy Workshops, 229-235, 2014 | 28 | 2014 |
Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle F Kammüller, JC Augusto, S Jones 2017 IEEE 15th International Conference on Software Engineering Research …, 2017 | 23 | 2017 |
Combining secure system design with risk assessment for iot healthcare systems F Kammüller 2019 IEEE International Conference on Pervasive Computing and Communications …, 2019 | 22 | 2019 |
A probabilistic analysis framework for malicious insider threats T Chen, F Kammüller, I Nemli, CW Probst International Conference on Human Aspects of Information Security, Privacy …, 2015 | 21 | 2015 |
Human centric security and privacy for the iot using formal techniques F Kammüller Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2017 …, 2018 | 20 | 2018 |
Attack trees in Isabelle F Kammüller Information and Communications Security: 20th International Conference …, 2018 | 19 | 2018 |
Translating fusion/UML to object-Z M Bittner, F Kammuller First ACM and IEEE International Conference on Formal Methods and Models for …, 2003 | 18 | 2003 |
Representing hierarchical automata in interactive theorem provers S Helke, F Kammüller International Conference on Theorem Proving in Higher Order Logics, 233-248, 2001 | 18 | 2001 |
Investigating airplane safety and security against insider threats using logical modeling F Kammüller, M Kerber 2016 IEEE Security and Privacy Workshops (SPW), 304-313, 2016 | 17 | 2016 |