
Information Security Maturity as an Integral Part of ISMS based Risk Management Tools,
Ben Fetler, Carlo Harpes,
24th to 28th July 2016, the tenth international conference on emerging security information, systems and technologies – SECURWARE 2016, Nice, France
Gadyatskaya O., Harpes C., Mauw S., Muller C., Muller S.
(2016) Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.
In: Kordy B., Ekstedt M., Kim D. (eds) Graphical Models for Security.
GraMSec 2016. Lecture Notes in Computer Science, vol 9987. Springer, Cham.
Steve Muller, ‘Risk monitoring in industrial control systems’, in Advanced Data Collection and Risks (ADaCoR) Workshop 2016, 2016.
B. Fetler and S. Muller, ‘Dynamic risk analysis’, in Security Assessment for Systems, Services, and Infrastructures (SASSI) Workshop 2015, 2015.
"Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets"
Dianxiang Xu, Michael Kent, Lijo Thomas, Tejeddine Mouelhi, and Yves Le Traon
IEEE Transactions on Computers PrePrint, no. 1, pp. 1, doi:10.1109/TC.2014.2375189