Foundations of attack trees S Mauw, M Oostdijk Information Security and Cryptology-ICISC 2005: 8th International Conference …, 2006 | 705 | 2006 |
Foundations of attack–defense trees B Kordy, S Mauw, S Radomirović, P Schweitzer Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011 | 367 | 2011 |
An algebraic semantics of basic message sequence charts S Mauw, MA Reniers The computer journal 37 (4), 269-277, 1994 | 222 | 1994 |
Operational Semantics and Verification of Security Protocols C Cremers, S Mauw Operational Semantics and Verification of Security Protocols, 2012 | 214* | 2012 |
Attack–defense trees B Kordy, S Mauw, S Radomirović, P Schweitzer Journal of Logic and Computation 24 (1), 55-87, 2014 | 213 | 2014 |
Formal test automation: A simple experiment A Belinfante, J Feenstra, RG de Vries, J Tretmans, N Goga, L Feijs, ... Testing of Communicating Systems: Methods and Applications, 179-196, 1999 | 200 | 1999 |
High-level message sequence charts S Mauw, MA Reniers SDL'97: Time for Testing, 291-306, 1997 | 169 | 1997 |
A process specification formalism S Mauw, GJ Veltink Fundamenta Informaticae 13 (2), 85-139, 1990 | 150 | 1990 |
Test generation for intelligent networks using model checking A Engels, L Feijs, S Mauw Tools and Algorithms for the Construction and Analysis of Systems: Third …, 1997 | 148 | 1997 |
ADTool: security analysis with attack–defense trees B Kordy, P Kordy, S Mauw, P Schweitzer International conference on quantitative evaluation of systems, 173-176, 2013 | 132 | 2013 |
Attack trees with sequential conjunction R Jhawar, B Kordy, S Mauw, S Radomirović, R Trujillo-Rasua IFIP International Information Security and Privacy Conference, 339-353, 2015 | 124 | 2015 |
Design and analysis of dynamic leader election protocols in broadcast networks J Brunekreef, JP Katoen, R Koymans, S Mauw Distributed Computing 9, 157-171, 1996 | 121 | 1996 |
A formalization of anonymity and onion routing S Mauw, JHS Verschuren, EP de Vink Computer Security–ESORICS 2004: 9th European Symposium on Research in …, 2004 | 109 | 2004 |
Model checking for managers W Janssen, R Mateescu, S Mauw, P Fennema, P Van Der Stappen Theoretical and Practical Aspects of SPIN Model Checking: 5th and 6th …, 1999 | 103 | 1999 |
Algebraic specification of communication protocols S Mauw, GJ Veltink Cambridge university press, 2008 | 97 | 2008 |
Untraceability of RFID protocols T Van Deursen, S Mauw, S Radomirović Information Security Theory and Practices. Smart Devices, Convergence and …, 2008 | 95 | 2008 |
A framework for compositional verification of security protocols S Andova, C Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, S Radomirović Information and Computation 206 (2-4), 425-459, 2008 | 88 | 2008 |
Operational semantics of security protocols C Cremers, S Mauw Scenarios: Models, Transformations and Tools: International Workshop …, 2005 | 87 | 2005 |
FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting CF Torres, H Jonker, S Mauw Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 84 | 2015 |
Privacy and verifiability in voting systems: Methods, developments and trends H Jonker, S Mauw, J Pang Computer Science Review 10, 1-30, 2013 | 82 | 2013 |