Hansen, Rene Rydhof
81  Ergebnisse:
Personensuche X
?
1

Statistical Model Checking for Probabilistic Hyperpropertie..:

, In: Model Checking Software; Lecture Notes in Computer Science,
 
?
2

Designing Through The Stack: The Case for a Participatory D..:

, In: Proceedings of the 2022 New Security Paradigms Workshop,
 
?
3

Understanding the Challenges of Blocking Unnamed Network Tr..:

, In: NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium,
 
?
4

ADTLang: a programming language approach to attack defense ..:

Hansen, René Rydhof ; Larsen, Kim Guldstrand ; Legay, Axel..
International Journal on Software Tools for Technology Transfer.  23 (2021)  1 - p. 89-104 , 2021
 
?
5

P4Fuzz: Compiler Fuzzer forDependable Programmable Dataplan..:

, In: International Conference on Distributed Computing and Networking 2021,
 
?
7

Gollector: Measuring Domain Name Dark Matter from Different..:

, In: Secure IT Systems; Lecture Notes in Computer Science,
 
?
8

Benign Interaction of Security Domains:

, In: Protocols, Strands, and Logic; Lecture Notes in Computer Science,
 
?
9

Adaptive Security Policies:

, In: Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles; Lecture Notes in Computer Science,
 
?
10

Haaukins: A Highly Accessible and Automated Virtualization ..:

, In: 2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT),
 
?
12

Semantics, Logics, and Calculi 

Essays Dedicated to Hanne Riis Nielson and Flemming Nielson...  Lecture Notes in Computer Science ; 9560;Theoretical Computer Science and General Issues ; 9560;SpringerLink, Bücher;Springer eBook Collection, Computer Science
 
?
13

Safety‐critical Java for embedded systems:

Schoeberl, Martin ; Dalsgaard, Andreas Engelbredt ; Hansen, René Rydhof...
Concurrency and Computation: Practice and Experience.  29 (2016)  22 - p. , 2016
 
?
15

Modelling Social-Technical Attacks with Timed Automata:

, In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats,
 
1-15