• Publications
  • Influence
Abstraction and composition: a verification method for co-operating systems
Behaviour of systems is described by formal languages: the sets of all sequences of actions. Regarding abstraction, alphabetic language homomorphisms are used to compute abstract behaviours. To avoidExpand
  • 26
  • 4
  • PDF
Fraud Detection in Mobile Payments Utilizing Process Behavior Analysis
Generally, fraud risk implies any intentional deception made for financial gain. In this paper, we consider this risk in the field of services which support transactions with electronic money.Expand
  • 29
  • 3
  • PDF
No Smurfs: Revealing Fraud Chains in Mobile Money Transfers
Mobile Money Transfer (MMT) services provided by mobile network operators enable funds transfers made on mobile devices of end-users, using digital equivalent of cash (electronic money) without anyExpand
  • 14
  • 3
  • PDF
The SH-Verification Tool — Abstraction-Based Verification of Co-operating Systems
Abstract. The sh-verification tool comprises computing abstractions of finite-state behaviour representations as well as automata and temporal logic based verification approaches. To be suitable forExpand
  • 49
  • 2
  • PDF
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting
The systematic protection of critical information infrastructures requires an analytical process to identify the critical components and their interplay, to determine the threats and vulnerabilities,Expand
  • 15
  • 1
  • PDF
Identification of Security Requirements in Systems of Systems by Functional Security Analysis
Cooperating systems typically base decisions on information from their own components as well as on input from other systems. Safety critical decisions based on cooperative reasoning however raiseExpand
  • 22
  • 1
  • PDF
Predictive Security Analysis for Event-Driven Processes
This paper presents an approach for predictive security analysis in a business process execution environment. It is based on operational formal models and leverages process and threat analysis andExpand
  • 18
  • 1
  • PDF
MASSIF: A Promising Solution to Enhance Olympic Games IT Security
Nowadays, Olympic Games have become one of the most profitable global media events, becoming at the same way more and more attractive target from the terrorist perspective due to their mediaExpand
  • 15
  • 1
  • PDF
Model-based Situational Security Analysis
Security analysis is growing in complexity with the increase in functionality, connectivity, and dynamics of current electronic business processes. To tackle this complexity, the application ofExpand
  • 15
  • 1
  • PDF
Behavior Analysis for Safety and Security in Automotive Systems
The connection of automotive systems with other systems such as road-side units, other vehicles, and various servers in the Internet opens up new ways for attackers to remotely access safety relevantExpand
  • 9
  • 1
  • PDF