Quantitative security and safety analysis with attack-fault trees R Kumar, M Stoelinga 2017 IEEE 18th International Symposium on High Assurance Systems Engineering …, 2017 | 97 | 2017 |
Quantitative attack tree analysis via priced timed automata R Kumar, E Ruijters, M Stoelinga Formal Modeling and Analysis of Timed Systems: 13th International Conference …, 2015 | 81 | 2015 |
Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua The Practice of Enterprise Modeling: 9th IFIP WG 8.1. Working Conference …, 2016 | 59 | 2016 |
Sequential and parallel attack tree modelling F Arnold, D Guck, R Kumar, M Stoelinga Computer Safety, Reliability, and Security: SAFECOMP 2015 Workshops, ASSURE …, 2015 | 46 | 2015 |
Effective analysis of attack trees: A model-driven approach R Kumar, S Schivo, E Ruijters, BM Yildiz, D Huistra, J Brandt, A Rensink, ... Fundamental Approaches to Software Engineering: 21st International …, 2018 | 30 | 2018 |
How to efficiently build a front-end tool for UPPAAL: a model-driven approach S Schivo, BM Yildiz, E Ruijters, C Gerking, R Kumar, S Dziwok, A Rensink, ... Dependable Software Engineering. Theories, Tools, and Applications: Third …, 2017 | 14 | 2017 |
AFMT: Maintaining the safety-security of industrial control systems R Kumar, B Narra, R Kela, S Singh Computers in Industry 136, 103584, 2022 | 9 | 2022 |
APT attacks on industrial control systems: A tale of three incidents R Kumar, R Kela, S Singh, R Trujillo-Rasua International Journal of Critical Infrastructure Protection 37, 100521, 2022 | 8 | 2022 |
Truth or dare: quantitative security risk analysis via attack trees R Kumar University of Twente, 2018 | 7 | 2018 |
Time dependent analysis with dynamic counter measure trees R Kumar, D Guck, MIA Stoelinga Thirteenth International Workshop on Quantitative Aspects of Programming …, 2015 | 7 | 2015 |
Analyzing Advanced Persistent Threats Using Game Theory: A Critical Literature Review R Kumar, S Singh, R Kela International Conference on Critical Infrastructure Protection, 45-69, 2021 | 5 | 2021 |
LOCKS: a property specification language for security goals R Kumar, A Rensink, M Stoelinga Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1907-1915, 2018 | 5 | 2018 |
A quantitative security risk analysis framework for modelling and analyzing advanced persistent threats R Kumar, S Singh, R Kela International Symposium on Foundations and Practice of Security, 29-46, 2020 | 4 | 2020 |
What changed in the cyber-security after COVID-19? R Kumar, S Sharma, C Vachhani, N Yadav Computers & Security, 2022 | 3 | 2022 |
A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures R Kumar International Conference on Critical Infrastructure Protection, 283-306, 2020 | 3 | 2020 |
Quantitative safety-security risk analysis of interconnected cyber-infrastructures R Kumar 2022 IEEE 10th Region 10 Humanitarian Technology Conference (R10-HTC), 100-106, 2022 | 1 | 2022 |
APT: a buzzword and a reality-A bibliometric review of the literature (2010-2020) BA Bhat, R Kumar 7th IEEE International Conference on Dependability in Sensor, Cloud, and Big …, 2021 | 1 | 2021 |
An attack tree template based on feature diagram hierarchy R Kumar 2020 IEEE 6th International Conference on Dependability in Sensor, Cloud and …, 2020 | 1 | 2020 |
Co-engineering Safety-Security Using Statistical Model Checking R Kumar, S Singh, B Narra, R kela Formal Techniques for Distributed Objects, Components, and Systems. FORTE …, 2022 | | 2022 |