Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Foundations of Attack Trees
- S. Mauw, M. Oostdijk
- Computer Science
- ICISC
- 1 December 2005
TLDR
Specification-based intrusion detection for advanced metering infrastructures
- B Kordy, S. Mauw, +4 authors S. Moradmand
It is critical to develop an effective way to monitor advanced metering infrastructures (AMI). To ensure the security and reliability of a modernized power grid, the current deployment of millions of… Expand
- 132
- 16
- PDF
Foundations of Attack-Defense Trees
- Barbara Kordy, S. Mauw, S. Radomirovic, P. Schweitzer
- Computer Science
- Formal Aspects in Security and Trust
- 16 September 2010
We introduce and give formal definitions of attack-defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is… Expand
Operational Semantics and Verification of Security Protocols
- C. Cremers, S. Mauw
- Computer Science
- Information Security and Cryptography
- 30 October 2012
TLDR
ADTool: Security Analysis with Attack-Defense Trees
- Barbara Kordy, P. Kordy, S. Mauw, P. Schweitzer
- Computer Science
- QEST
- 27 August 2013
ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack---defense trees. The main features of ADTool are easy creation, efficient… Expand
Injective synchronisation: An extension of the authentication hierarchy
- C. Cremers, S. Mauw, E. Vink
- Computer Science, Mathematics
- Theor. Comput. Sci.
- 24 November 2006
TLDR
The Formalization of Message Sequence Charts
- S. Mauw
- Computer Science
- Comput. Networks ISDN Syst.
- 1 June 1996
TLDR
An Algebraic Semantics of Basic Message Sequence Charts
- S. Mauw, M. Reniers
- Computer Science
- Comput. J.
- 1994
TLDR
High-level message sequence charts
- S. Mauw, M. Reniers
- Computer Science
- SDL Forum
- 1997
TLDR