Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: René Rydhof Hansen
@inproceedings{DBLP:conf/noms/HagemanKHP22, author = {Kaspar Hageman and Egon Kidmose and Ren{\'{e}} Rydhof Hansen and Jens Myrup Pedersen}, title = {Understanding the Challenges of Blocking Unnamed Network Traffic}, booktitle = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2022, Budapest, Hungary, April 25-29, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/NOMS54207.2022.9789854}, doi = {10.1109/NOMS54207.2022.9789854}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/noms/HagemanKHP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SlesingerCPH22, author = {Ian Slesinger and Lizzie Coles{-}Kemp and Niki Panteli and Ren{\'{e}} Rydhof Hansen}, title = {Designing Through The Stack: The Case for a Participatory Digital Security By Design}, booktitle = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022, North Conway, NH, USA, October 24-27, 2022}, pages = {45--59}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584318.3584322}, doi = {10.1145/3584318.3584322}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/SlesingerCPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spin/AroraHLLP22, author = {Shiraj Arora and Ren{\'{e}} Rydhof Hansen and Kim Guldstrand Larsen and Axel Legay and Danny B{\o}gsted Poulsen}, editor = {Owolabi Legunsen and Grigore Rosu}, title = {Statistical Model Checking for Probabilistic Hyperproperties of Real-Valued Signals}, booktitle = {Model Checking Software - 28th International Symposium, {SPIN} 2022, Virtual Event, May 21, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13255}, pages = {61--78}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15077-7\_4}, doi = {10.1007/978-3-031-15077-7\_4}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spin/AroraHLLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/HansenLLJP21, author = {Ren{\'{e}} Rydhof Hansen and Kim Guldstrand Larsen and Axel Legay and Peter Gj{\o}l Jensen and Danny B{\o}gsted Poulsen}, title = {ADTLang: a programming language approach to attack defense trees}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {23}, number = {1}, pages = {89--104}, year = {2021}, url = {https://doi.org/10.1007/s10009-020-00593-w}, doi = {10.1007/S10009-020-00593-W}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/HansenLLJP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/NielsonHN21, author = {Flemming Nielson and Ren{\'{e}} Rydhof Hansen and Hanne Riis Nielson}, editor = {Daniel Dougherty and Jos{\'{e}} Meseguer and Sebastian Alexander M{\"{o}}dersheim and Paul D. Rowe}, title = {Benign Interaction of Security Domains}, booktitle = {Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday}, series = {Lecture Notes in Computer Science}, volume = {13066}, pages = {312--331}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91631-2\_17}, doi = {10.1007/978-3-030-91631-2\_17}, timestamp = {Thu, 21 Sep 2023 09:08:34 +0200}, biburl = {https://dblp.org/rec/conf/birthday/NielsonHN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/AgapeDH021, author = {Andrei{-}Alexandru Agape and Madalin Claudiu Danceanu and Ren{\'{e}} Rydhof Hansen and Stefan Schmid}, title = {P4Fuzz: Compiler Fuzzer forDependable Programmable Dataplanes}, booktitle = {{ICDCN} '21: International Conference on Distributed Computing and Networking, Virtual Event, Nara, Japan, January 5-8, 2021}, pages = {16--25}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3427796.3427798}, doi = {10.1145/3427796.3427798}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcn/AgapeDH021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HagemanHP21, author = {Kaspar Hageman and Ren{\'{e}} Rydhof Hansen and Jens Myrup Pedersen}, editor = {Nicola Tuveri and Antonis Michalas and Billy Bob Brumley}, title = {Gollector: Measuring Domain Name Dark Matter from Different Vantage Points}, booktitle = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13115}, pages = {133--152}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91625-1\_8}, doi = {10.1007/978-3-030-91625-1\_8}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/HagemanHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MollerSJPBCPLHJ21, author = {Bjarke Hilmer M{\o}ller and Jacob Gosch S{\o}ndergaard and Kristoffer Skagb{\ae}k Jensen and Magnus Winkel Pedersen and Tobias Worm B{\o}gedal and Anton Christensen and Danny B{\o}gsted Poulsen and Kim Guldstrand Larsen and Ren{\'{e}} Rydhof Hansen and Thomas Rosted Jensen and Heino Juvoll Madsen and Henrik Uhrenfeldt}, editor = {Nicola Tuveri and Antonis Michalas and Billy Bob Brumley}, title = {Preliminary Security Analysis, Formalisation, and Verification of OpenTitan Secure Boot Code}, booktitle = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13115}, pages = {192--211}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91625-1\_11}, doi = {10.1007/978-3-030-91625-1\_11}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/MollerSJPBCPLHJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HagemanKHP21, author = {Kaspar Hageman and Egon Kidmose and Ren{\'{e}} Rydhof Hansen and Jens Myrup Pedersen}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Can a {TLS} Certificate Be Phishy?}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {38--49}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010516600380049}, doi = {10.5220/0010516600380049}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HagemanKHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isola/NielsonHN20, author = {Flemming Nielson and Ren{\'{e}} Rydhof Hansen and Hanne Riis Nielson}, editor = {Tiziana Margaria and Bernhard Steffen}, title = {Adaptive Security Policies}, booktitle = {Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles - 9th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2020, Rhodes, Greece, October 20-30, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12477}, pages = {280--294}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61470-6\_17}, doi = {10.1007/978-3-030-61470-6\_17}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isola/NielsonHN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PanumHHP20, author = {Thomas Kobber Panum and Kaspar Hageman and Ren{\'{e}} Rydhof Hansen and Jens Myrup Pedersen}, editor = {Tamara Denning and Tyler Moore}, title = {Towards Adversarial Phishing Detection}, booktitle = {13th {USENIX} Workshop on Cyber Security Experimentation and Test, {CSET} 2020, August 10, 2020}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/cset20/presentation/panum}, timestamp = {Mon, 01 Feb 2021 08:43:06 +0100}, biburl = {https://dblp.org/rec/conf/uss/PanumHHP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/DharanikotJKMPH19, author = {Samvid Dharanikot and Michael Toft Jensen and Sebastian Rom Kristensen and Mathias Sass Michno and Yvonne{-}Anne Pignolet and Ren{\'{e}} Rydhof Hansen and Stefan Schmid}, title = {Breeding Unicorns: Developing Trustworthy and Scalable Randomness Beacons}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}, pages = {99--106}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/Blockchain.2019.00022}, doi = {10.1109/BLOCKCHAIN.2019.00022}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/DharanikotJKMPH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ew/NielsenHL19, author = {Lars Nielsen and Ren{\'{e}} Rydhof Hansen and Daniel E. Lucani}, title = {A Multi-Threaded Approach to Encoding with Random Linear Network Coding}, booktitle = {25th European Wireless Conference, {EW} 2019, Aarhus, Denmark, May 2-4, 2019}, pages = {1--7}, publisher = {{VDE} / {IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/document/8835934}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ew/NielsenHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalt/PanumHPH19, author = {Thomas Kobber Panum and Kaspar Hageman and Jens Myrup Pedersen and Ren{\'{e}} Rydhof Hansen}, editor = {Maiga Chang and Demetrios G. Sampson and Ronghuai Huang and Alex Sandro Gomes and Nian{-}Shing Chen and Ig Ibert Bittencourt and Kinshuk and Diego Dermeval and Ibsen Mateus Bittencourt}, title = {Haaukins: {A} Highly Accessible and Automated Virtualization Platform for Security Education}, booktitle = {19th {IEEE} International Conference on Advanced Learning Technologies, {ICALT} 2019, Macei{\'{o}}, Brazil, July 15-18, 2019}, pages = {236--238}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICALT.2019.00073}, doi = {10.1109/ICALT.2019.00073}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalt/PanumHPH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tma/PanumHP19, author = {Thomas Kobber Panum and Ren{\'{e}} Rydhof Hansen and Jens Myrup Pedersen}, editor = {Stefano Secci and Isabelle Chrisment and Marco Fiore and Lionel Tabourier and Keun{-}Woo Lim}, title = {Kraaler: {A} User-Perspective Web Crawler}, booktitle = {Network Traffic Measurement and Analysis Conference, {TMA} 2019, Paris, France, June 19-21, 2019}, pages = {153--160}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/TMA.2019.8784660}, doi = {10.23919/TMA.2019.8784660}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tma/PanumHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2019, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0}, doi = {10.1007/978-3-030-35055-0}, isbn = {978-3-030-35054-3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmu/HansenP18, author = {Ren{\'{e}} Rydhof Hansen and Christian W. Probst}, title = {Modelling and Analysing Overlay Networks by Ambients with Wormholes}, booktitle = {Eleventh International Conference on Mobile Computing and Ubiquitous Network, {ICMU} 2018, Auckland, New Zealand, October 5-8, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/ICMU.2018.8653596}, doi = {10.23919/ICMU.2018.8653596}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmu/HansenP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-00128, author = {Andrei{-}Alexandru Agape and Madalin Claudiu Danceanu and Ren{\'{e}} Rydhof Hansen and Stefan Schmid}, title = {Charting the Security Landscape of Programmable Dataplanes}, journal = {CoRR}, volume = {abs/1807.00128}, year = {2018}, url = {http://arxiv.org/abs/1807.00128}, eprinttype = {arXiv}, eprint = {1807.00128}, timestamp = {Wed, 06 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-00128.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/SchoeberlDHKRRS17, author = {Martin Schoeberl and Andreas Engelbredt Dalsgaard and Ren{\'{e}} Rydhof Hansen and Stephan Erbs Korsholm and Anders P. Ravn and Juan Ricardo Rios Rivas and T{\'{o}}rur Biskopst{\o} Str{\o}m and Hans S{\o}ndergaard and Andy J. Wellings and Shuai Zhao}, title = {Safety-critical Java for embedded systems}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {22}, year = {2017}, url = {https://doi.org/10.1002/cpe.3963}, doi = {10.1002/CPE.3963}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/SchoeberlDHKRRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HansenJLLP17, author = {Ren{\'{e}} Rydhof Hansen and Peter Gj{\o}l Jensen and Kim Guldstrand Larsen and Axel Legay and Danny B{\o}gsted Poulsen}, editor = {Peng Liu and Sjouke Mauw and Ketil St{\o}len}, title = {Quantitative Evaluation of Attack Defense Trees Using Stochastic Timed Automata}, booktitle = {Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10744}, pages = {75--90}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-74860-3\_5}, doi = {10.1007/978-3-319-74860-3\_5}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/HansenJLLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/Coles-KempH17, author = {Lizzie Coles{-}Kemp and Ren{\'{e}} Rydhof Hansen}, editor = {Theo Tryfonas}, title = {Walking the Line: The Everyday Security Ties that Bind}, booktitle = {Human Aspects of Information Security, Privacy and Trust - 5th International Conference, {HAS} 2017, Held as Part of {HCI} International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10292}, pages = {464--480}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58460-7\_32}, doi = {10.1007/978-3-319-58460-7\_32}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/Coles-KempH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/HansenLOW16, author = {Ren{\'{e}} Rydhof Hansen and Kim Guldstrand Larsen and Mads Chr. Olesen and Erik Ramsgaard Wognsen}, title = {Formal modelling and analysis of Bitflips in {ARM} assembly code}, journal = {Inf. Syst. Frontiers}, volume = {18}, number = {5}, pages = {909--925}, year = {2016}, url = {https://doi.org/10.1007/s10796-016-9665-7}, doi = {10.1007/S10796-016-9665-7}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/HansenLOW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/ProbstKH16, author = {Christian W. Probst and Florian Kamm{\"{u}}ller and Ren{\'{e}} Rydhof Hansen}, editor = {Christian W. Probst and Chris Hankin and Ren{\'{e}} Rydhof Hansen}, title = {Formal Modelling and Analysis of Socio-Technical Systems}, booktitle = {Semantics, Logics, and Calculi - Essays Dedicated to Hanne Riis Nielson and Flemming Nielson on the Occasion of Their 60th Birthdays}, series = {Lecture Notes in Computer Science}, volume = {9560}, pages = {54--73}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-27810-0\_3}, doi = {10.1007/978-3-319-27810-0\_3}, timestamp = {Tue, 21 Mar 2023 20:58:42 +0100}, biburl = {https://dblp.org/rec/conf/birthday/ProbstKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/OlesenHL16, author = {Mads Christian Olesen and Ren{\'{e}} Rydhof Hansen and Kim Guldstrand Larsen}, editor = {Christian W. Probst and Chris Hankin and Ren{\'{e}} Rydhof Hansen}, title = {An Automata-Based Approach to Trace Partitioned Abstract Interpretation}, booktitle = {Semantics, Logics, and Calculi - Essays Dedicated to Hanne Riis Nielson and Flemming Nielson on the Occasion of Their 60th Birthdays}, series = {Lecture Notes in Computer Science}, volume = {9560}, pages = {88--110}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-27810-0\_5}, doi = {10.1007/978-3-319-27810-0\_5}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/OlesenHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ddecs/WognsenHLK16, author = {Erik Ramsgaard Wognsen and Ren{\'{e}} Rydhof Hansen and Kim Guldstrand Larsen and Peter Koch}, title = {Energy-aware scheduling of {FIR} filter structures using a timed automata model}, booktitle = {2016 {IEEE} 19th International Symposium on Design and Diagnostics of Electronic Circuits {\&} Systems (DDECS), Kosice, Slovakia, April 20-22, 2016}, pages = {163--168}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/DDECS.2016.7482468}, doi = {10.1109/DDECS.2016.7482468}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ddecs/WognsenHLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/formats/GadyatskayaHLLO16, author = {Olga Gadyatskaya and Ren{\'{e}} Rydhof Hansen and Kim Guldstrand Larsen and Axel Legay and Mads Chr. Olesen and Danny B{\o}gsted Poulsen}, editor = {Martin Fr{\"{a}}nzle and Nicolas Markey}, title = {Modelling Attack-defense Trees Using Timed Automata}, booktitle = {Formal Modeling and Analysis of Timed Systems - 14th International Conference, {FORMATS} 2016, Quebec, QC, Canada, August 24-26, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9884}, pages = {35--50}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44878-7\_3}, doi = {10.1007/978-3-319-44878-7\_3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/formats/GadyatskayaHLLO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/birthday/2016nielson, editor = {Christian W. Probst and Chris Hankin and Ren{\'{e}} Rydhof Hansen}, title = {Semantics, Logics, and Calculi - Essays Dedicated to Hanne Riis Nielson and Flemming Nielson on the Occasion of Their 60th Birthdays}, series = {Lecture Notes in Computer Science}, volume = {9560}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-27810-0}, doi = {10.1007/978-3-319-27810-0}, isbn = {978-3-319-27809-4}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/2016nielson.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DavidDHLLOP15, author = {Nicolas David and Alexandre David and Ren{\'{e}} Rydhof Hansen and Kim Guldstrand Larsen and Axel Legay and Mads Chr. Olesen and Christian W. Probst}, editor = {Elisa Bertino and Ilsun You}, title = {Modelling Social-Technical Attacks with Timed Automata}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {21--28}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808787}, doi = {10.1145/2808783.2808787}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DavidDHLLOP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/IvanovaPHK15, author = {Marieta Georgieva Ivanova and Christian W. Probst and Ren{\'{e}} Rydhof Hansen and Florian Kamm{\"{u}}ller}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {Transforming Graphical System Models to Graphical Attack Models}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {82--96}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_6}, doi = {10.1007/978-3-319-29968-6\_6}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/IvanovaPHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/formats/WognsenHJHL15, author = {Erik Ramsgaard Wognsen and Boudewijn R. Haverkort and Marijn R. Jongerden and Ren{\'{e}} Rydhof Hansen and Kim Guldstrand Larsen}, editor = {Sriram Sankaranarayanan and Enrico Vicario}, title = {A Score Function for Optimizing the Cycle-Life of Battery-Powered Embedded Systems}, booktitle = {Formal Modeling and Analysis of Timed Systems - 13th International Conference, {FORMATS} 2015, Madrid, Spain, September 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9268}, pages = {305--320}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22975-1\_20}, doi = {10.1007/978-3-319-22975-1\_20}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/formats/WognsenHJHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/HansenLOW15, author = {Ren{\'{e}} Rydhof Hansen and Kim Guldstrand Larsen and Mads Chr. Olesen and Erik Ramsgaard Wognsen}, title = {Formal Methods for Modelling and Analysis of Single-Event Upsets}, booktitle = {2015 {IEEE} International Conference on Information Reuse and Integration, {IRI} 2015, San Francisco, CA, USA, August 13-15, 2015}, pages = {287--294}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/IRI.2015.54}, doi = {10.1109/IRI.2015.54}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/HansenLOW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/PedersenSLNH15, author = {Martin Leth Pedersen and Michael Hedegaard S{\o}rensen and Daniel Lux and Ulrik Nyman and Ren{\'{e}} Rydhof Hansen}, editor = {Sonja Buchegger and Mads Dam}, title = {The Timed Decentralised Label Model}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {27--43}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_3}, doi = {10.1007/978-3-319-26502-5\_3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/PedersenSLNH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sies/SkelinWOHL15, author = {Mladen Skelin and Erik Ramsgaard Wognsen and Mads Chr. Olesen and Ren{\'{e}} Rydhof Hansen and Kim Guldstrand Larsen}, title = {Model checking of finite-state machine-based scenario-aware dataflow using timed automata}, booktitle = {10th {IEEE} International Symposium on Industrial Embedded Systems, {SIES} 2015, Siegen, Germany, June 8-10, 2015}, pages = {235--244}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/SIES.2015.7185065}, doi = {10.1109/SIES.2015.7185065}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sies/SkelinWOHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/IvanovaPHK15, author = {Marieta Georgieva Ivanova and Christian W. Probst and Ren{\'{e}} Rydhof Hansen and Florian Kamm{\"{u}}ller}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Attack Tree Generation by Policy Invalidation}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {249--259}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_16}, doi = {10.1007/978-3-319-24018-3\_16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/IvanovaPHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/OlesenHLP14, author = {Mads Chr. Olesen and Ren{\'{e}} Rydhof Hansen and Julia L. Lawall and Nicolas Palix}, title = {Coccinelle: Tool support for automated {CERT} {C} Secure Coding Standard certification}, journal = {Sci. Comput. Program.}, volume = {91}, pages = {141--160}, year = {2014}, url = {https://doi.org/10.1016/j.scico.2012.10.011}, doi = {10.1016/J.SCICO.2012.10.011}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scp/OlesenHLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/WognsenKOH14, author = {Erik Ramsgaard Wognsen and Henrik S{\o}ndberg Karlsen and Mads Chr. Olesen and Ren{\'{e}} Rydhof Hansen}, title = {Formalisation and analysis of Dalvik bytecode}, journal = {Sci. Comput. Program.}, volume = {92}, pages = {25--55}, year = {2014}, url = {https://doi.org/10.1016/j.scico.2013.11.037}, doi = {10.1016/J.SCICO.2013.11.037}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scp/WognsenKOH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isola/WognsenHL14, author = {Erik Ramsgaard Wognsen and Ren{\'{e}} Rydhof Hansen and Kim Guldstrand Larsen}, editor = {Tiziana Margaria and Bernhard Steffen}, title = {Battery-Aware Scheduling of Mixed Criticality Systems}, booktitle = {Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications - 6th International Symposium, ISoLA 2014, Imperial, Corfu, Greece, October 8-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8803}, pages = {208--222}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45231-8\_15}, doi = {10.1007/978-3-662-45231-8\_15}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isola/WognsenHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jtres/SchoeberlDHKRRSS14, author = {Martin Schoeberl and Andreas Engelbredt Dalsgaard and Ren{\'{e}} Rydhof Hansen and Stephan Erbs Korsholm and Anders P. Ravn and Juan Ricardo Rios Rivas and T{\'{o}}rur Biskopst{\o} Str{\o}m and Hans S{\o}ndergaard}, editor = {Wolfgang Puffitsch}, title = {Certifiable Java for Embedded Systems}, booktitle = {Proceedings of the 12th International Workshop on Java Technologies for Real-time and Embedded Systems, {JTRES} 2014, Niagara Falls, NY, USA, October 13-14, 2014}, pages = {10}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2661020.2661025}, doi = {10.1145/2661020.2661025}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/jtres/SchoeberlDHKRRSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapp/ProbstH14, author = {Christian W. Probst and Ren{\'{e}} Rydhof Hansen}, editor = {Adriane Chapman and Bertram Lud{\"{a}}scher and Andreas Schreiber}, title = {Model-based Abstraction of Data Provenance}, booktitle = {6th Workshop on the Theory and Practice of Provenance, TaPP'14, Cologne, Germany, June 12-13, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/tapp2014/agenda/presentation/probst}, timestamp = {Tue, 02 Feb 2021 08:04:56 +0100}, biburl = {https://dblp.org/rec/conf/tapp/ProbstH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isse/BogholmFHJLRST13, author = {Thomas B{\o}gholm and Christian Frost and Ren{\'{e}} Rydhof Hansen and Casper Svenning Jensen and Kasper S{\o}e Luckow and Anders P. Ravn and Hans S{\o}ndergaard and Bent Thomsen}, title = {Towards harnessing theories through tool support for hard real-time Java programming}, journal = {Innov. Syst. Softw. Eng.}, volume = {9}, number = {1}, pages = {17--28}, year = {2013}, url = {https://doi.org/10.1007/s11334-012-0185-4}, doi = {10.1007/S11334-012-0185-4}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isse/BogholmFHJLRST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/IvanovaPHK13, author = {Marieta Georgieva Ivanova and Christian W. Probst and Ren{\'{e}} Rydhof Hansen and Florian Kamm{\"{u}}ller}, title = {Externalizing Behaviour for Analysing System Models}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {52--62}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.052}, doi = {10.22667/JISIS.2013.11.31.052}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/IvanovaPHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ProbstH13, author = {Christian W. Probst and Ren{\'{e}} Rydhof Hansen}, title = {Reachability-based Impact as a Measure for Insiderness}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {38--48}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.038}, doi = {10.22667/JOWUA.2013.12.31.038}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ProbstH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/LawallBPHSM13, author = {Julia L. Lawall and Julien Brunel and Nicolas Palix and Ren{\'{e}} Rydhof Hansen and Henrik Stuart and Gilles Muller}, title = {{WYSIWIB:} exploiting fine-grained program structure in a scriptable API-usage protocol-finding process}, journal = {Softw. Pract. Exp.}, volume = {43}, number = {1}, pages = {67--92}, year = {2013}, url = {https://doi.org/10.1002/spe.2102}, doi = {10.1002/SPE.2102}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/LawallBPHSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jtres/AndersenTDH13, author = {Jeppe L. Andersen and Mikkel Todberg and Andreas Engelbredt Dalsgaard and Ren{\'{e}} Rydhof Hansen}, editor = {Fridtjof Siebert and Kelvin Nilsen}, title = {Worst-case memory consumption analysis for {SCJ}}, booktitle = {The 11th International Workshop on Java Technologies for Real-time and Embedded Systems, {JTRES} '13, Karlsruhe, Germany, October 9-11, 2013}, pages = {2--10}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2512989.2513000}, doi = {10.1145/2512989.2513000}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/jtres/AndersenTDH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jtres/DalsgaardHS12, author = {Andreas Engelbredt Dalsgaard and Ren{\'{e}} Rydhof Hansen and Martin Schoeberl}, editor = {Martin Schoeberl and Andy J. Wellings}, title = {Private memory allocation analysis for safety-critical Java}, booktitle = {The 10th International Workshop on Java Technologies for Real-time and Embedded Systems, {JTRES} '12, Copenhagen, Denmark, October 24-26, 2012}, pages = {9--17}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2388936.2388939}, doi = {10.1145/2388936.2388939}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/jtres/DalsgaardHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/JensenPOH12, author = {Torben Jensen and Heine Pedersen and Mads Chr. Olesen and Ren{\'{e}} Rydhof Hansen}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {{THAPS:} Automated Vulnerability Scanning of {PHP} Applications}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {31--46}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_3}, doi = {10.1007/978-3-642-34210-3\_3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/JensenPOH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcet/CassezHO12, author = {Franck Cassez and Ren{\'{e}} Rydhof Hansen and Mads Chr. Olesen}, editor = {Tullio Vardanega}, title = {What is a Timing Anomaly?}, booktitle = {12th International Workshop on Worst-Case Execution Time Analysis, {WCET} 2012, July 10, 2012, Pisa, Italy}, series = {OASIcs}, volume = {23}, pages = {1--12}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2012}, url = {https://doi.org/10.4230/OASIcs.WCET.2012.1}, doi = {10.4230/OASICS.WCET.2012.1}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcet/CassezHO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isorc/SondergaardTRHB11, author = {Hans S{\o}ndergaard and Bent Thomsen and Anders P. Ravn and Ren{\'{e}} Rydhof Hansen and Thomas B{\o}gholm}, title = {Refactoring Real-Time Java Profiles}, booktitle = {14th {IEEE} International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, {ISORC} 2011, Newport Beach, California, USA, 28-31 March 2011}, pages = {109--116}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ISORC.2011.23}, doi = {10.1109/ISORC.2011.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isorc/SondergaardTRHB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nfm/DalsgaardHJLOOS11, author = {Andreas Engelbredt Dalsgaard and Ren{\'{e}} Rydhof Hansen and Kenneth Yrke J{\o}rgensen and Kim Guldstrand Larsen and Mads Chr. Olesen and Petur Olsen and Jir{\'{\i}} Srba}, editor = {Mihaela Gheorghiu Bobaru and Klaus Havelund and Gerard J. Holzmann and Rajeev Joshi}, title = {opaal: {A} Lattice Model Checker}, booktitle = {{NASA} Formal Methods - Third International Symposium, {NFM} 2011, Pasadena, CA, USA, April 18-20, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6617}, pages = {487--493}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20398-5\_37}, doi = {10.1007/978-3-642-20398-5\_37}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nfm/DalsgaardHJLOOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssv/BrauerHKLO11, author = {J{\"{o}}rg Brauer and Ren{\'{e}} Rydhof Hansen and Stefan Kowalewski and Kim G. Larsen and Mads Chr. Olesen}, editor = {J{\"{o}}rg Brauer and Marco Roveri and Hendrik Tews}, title = {Adaptable Value-Set Analysis for Low-Level Code}, booktitle = {6th International Workshop on Systems Software Verification, {SSV} 2011, August 26, 2011, Nijmegen, The Netherlands}, series = {OASIcs}, volume = {24}, pages = {32--43}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2011}, url = {https://doi.org/10.4230/OASIcs.SSV.2011.32}, doi = {10.4230/OASICS.SSV.2011.32}, timestamp = {Tue, 15 Feb 2022 09:40:04 +0100}, biburl = {https://dblp.org/rec/conf/ssv/BrauerHKLO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eceasst/OlesenHLP10, author = {Mads Chr. Olesen and Ren{\'{e}} Rydhof Hansen and Julia L. Lawall and Nicolas Palix}, title = {Clang and Coccinelle: Synergising program analysis tools for {CERT} {C} Secure Coding Standard certification}, journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.}, volume = {33}, year = {2010}, url = {https://doi.org/10.14279/tuj.eceasst.33.455}, doi = {10.14279/TUJ.ECEASST.33.455}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eceasst/OlesenHLP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BolanderH10, author = {Thomas Bolander and Ren{\'{e}} Rydhof Hansen}, title = {Hybrid logical analyses of the ambient calculus}, journal = {Inf. Comput.}, volume = {208}, number = {5}, pages = {433--449}, year = {2010}, url = {https://doi.org/10.1016/j.ic.2009.01.006}, doi = {10.1016/J.IC.2009.01.006}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/BolanderH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/NicolaGHNNPP10, author = {Rocco De Nicola and Daniele Gorla and Ren{\'{e}} Rydhof Hansen and Flemming Nielson and Hanne Riis Nielson and Christian W. Probst and Rosario Pugliese}, title = {From Flow Logic to static type systems for coordination languages}, journal = {Sci. Comput. Program.}, volume = {75}, number = {6}, pages = {376--397}, year = {2010}, url = {https://doi.org/10.1016/j.scico.2009.07.009}, doi = {10.1016/J.SCICO.2009.07.009}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scp/NicolaGHNNPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/LawallLHPM10, author = {Julia Lawall and Ben Laurie and Ren{\'{e}} Rydhof Hansen and Nicolas Palix and Gilles Muller}, title = {Finding Error Handling Bugs in OpenSSL Using Coccinelle}, booktitle = {Eighth European Dependable Computing Conference, {EDCC-8} 2010, Valencia, Spain, 28-30 April 2010}, pages = {191--196}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/EDCC.2010.31}, doi = {10.1109/EDCC.2010.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edcc/LawallLHPM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jtres/BogholmHRTS10, author = {Thomas B{\o}gholm and Ren{\'{e}} Rydhof Hansen and Anders P. Ravn and Bent Thomsen and Hans S{\o}ndergaard}, editor = {Tomas Kalibera and Jan Vitek}, title = {Schedulability analysis for Java finalizers}, booktitle = {Proceedings of the 8th International Workshop on Java Technologies for Real-Time and Embedded Systems, {JTRES} 2010, Prague, Czech Republic, August 19-21, 2010}, series = {{ACM} International Conference Proceeding Series}, pages = {1--7}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1850771.1850772}, doi = {10.1145/1850771.1850772}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/jtres/BogholmHRTS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcet/DalsgaardOTHL10, author = {Andreas Engelbredt Dalsgaard and Mads Chr. Olesen and Martin Toft and Ren{\'{e}} Rydhof Hansen and Kim Guldstrand Larsen}, editor = {Bj{\"{o}}rn Lisper}, title = {{METAMOC:} Modular Execution Time Analysis using Model Checking}, booktitle = {10th International Workshop on Worst-Case Execution Time Analysis, {WCET} 2010, July 6, 2010, Brussels, Belgium}, series = {OASIcs}, volume = {15}, pages = {113--123}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany}, year = {2010}, url = {https://doi.org/10.4230/OASIcs.WCET.2010.113}, doi = {10.4230/OASICS.WCET.2010.113}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcet/DalsgaardOTHL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/BogholmHRST10, author = {Thomas B{\o}gholm and Ren{\'{e}} Rydhof Hansen and Anders P. Ravn and Hans S{\o}ndergaard and Bent Thomsen}, title = {Formal Modelling and Analysis of Predictable Java}, journal = {{ERCIM} News}, volume = {2010}, number = {81}, year = {2010}, url = {http://ercim-news.ercim.eu/en81/rd/formal-modelling-and-analysis-of-predictable-java}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/BogholmHRST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/LawallHPM10, author = {Julia Lawall and Ren{\'{e}} Rydhof Hansen and Nicolas Palix and Gilles Muller}, title = {Improving the Security of Infrastructure Software using Coccinelle}, journal = {{ERCIM} News}, volume = {2010}, number = {83}, pages = {54}, year = {2010}, url = {http://ercim-news.ercim.eu/en83/rd/improving-the-security-of-infrastructure-software-using-coccinelle}, timestamp = {Mon, 17 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ercim/LawallHPM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LawallBPHSM09, author = {Julia L. Lawall and Julien Brunel and Nicolas Palix and Ren{\'{e}} Rydhof Hansen and Henrik Stuart and Gilles Muller}, title = {{WYSIWIB:} {A} declarative approach to finding {API} protocols and bugs in Linux code}, booktitle = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009}, pages = {43--52}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DSN.2009.5270354}, doi = {10.1109/DSN.2009.5270354}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LawallBPHSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jtres/BogholmHRTS09, author = {Thomas B{\o}gholm and Ren{\'{e}} Rydhof Hansen and Anders P. Ravn and Bent Thomsen and Hans S{\o}ndergaard}, editor = {M. Teresa Higuera{-}Toledano and Martin Schoeberl}, title = {A predictable Java profile: rationale and implementations}, booktitle = {Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems, {JTRES} 2009, Madrid, Spain, September 23-25, 2009}, series = {{ACM} International Conference Proceeding Series}, pages = {150--159}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1620405.1620427}, doi = {10.1145/1620405.1620427}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/jtres/BogholmHRTS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ProbstH09, author = {Christian W. Probst and Ren{\'{e}} Rydhof Hansen}, editor = {Anil Somayaji and Richard Ford}, title = {Fluid information systems}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {125--132}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719048}, doi = {10.1145/1719030.1719048}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/ProbstH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/BrunelDHLM09, author = {Julien Brunel and Damien Doligez and Ren{\'{e}} Rydhof Hansen and Julia L. Lawall and Gilles Muller}, editor = {Zhong Shao and Benjamin C. Pierce}, title = {A foundation for flow-based program matching: using temporal logic and model checking}, booktitle = {Proceedings of the 36th {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, {POPL} 2009, Savannah, GA, USA, January 21-23, 2009}, pages = {114--126}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1480881.1480897}, doi = {10.1145/1480881.1480897}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/BrunelDHLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/ProbstH09, author = {Christian W. Probst and Ren{\'{e}} Rydhof Hansen}, title = {Analysing Access Control Specifications}, booktitle = {Fourth International {IEEE} Workshop on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2009, Berkeley, California, USA, May 21, 2009}, pages = {22--33}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SADFE.2009.13}, doi = {10.1109/SADFE.2009.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sadfe/ProbstH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ProbstH08, author = {Christian W. Probst and Ren{\'{e}} Rydhof Hansen}, title = {An extensible analysable system model}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {4}, pages = {235--246}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.012}, doi = {10.1016/J.ISTR.2008.10.012}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ProbstH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HansenNNP08, author = {Ren{\'{e}} Rydhof Hansen and Flemming Nielson and Hanne Riis Nielson and Christian W. Probst}, title = {Static Validation of Licence Conformance Policies}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {1104--1111}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.162}, doi = {10.1109/ARES.2008.162}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HansenNNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coordination/NicolaGHNNPP08, author = {Rocco De Nicola and Daniele Gorla and Ren{\'{e}} Rydhof Hansen and Flemming Nielson and Hanne Riis Nielson and Christian W. Probst and Rosario Pugliese}, editor = {Doug Lea and Gianluigi Zavattaro}, title = {From Flow Logic to Static Type Systems for Coordination Languages}, booktitle = {Coordination Models and Languages, 10th International Conference, {COORDINATION} 2008, Oslo, Norway, June 4-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5052}, pages = {100--116}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68265-3\_7}, doi = {10.1007/978-3-540-68265-3\_7}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/coordination/NicolaGHNNPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/PadioleauLHM08, author = {Yoann Padioleau and Julia Lawall and Ren{\'{e}} Rydhof Hansen and Gilles Muller}, editor = {Joseph S. Sventek and Steven Hand}, title = {Documenting and automating collateral evolutions in linux device drivers}, booktitle = {Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008}, pages = {247--260}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352592.1352618}, doi = {10.1145/1352592.1352618}, timestamp = {Tue, 20 Dec 2022 17:33:10 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/PadioleauLHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vmcai/JonesH08, author = {Neil D. Jones and Ren{\'{e}} Rydhof Hansen}, editor = {Francesco Logozzo and Doron A. Peled and Lenore D. Zuck}, title = {{CTL} as an Intermediate Language}, booktitle = {Verification, Model Checking, and Abstract Interpretation, 9th International Conference, {VMCAI} 2008, San Francisco, USA, January 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4905}, pages = {4}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78163-9\_2}, doi = {10.1007/978-3-540-78163-9\_2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vmcai/JonesH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/GordonHH09, author = {Andrew D. Gordon and Hans H{\"{u}}ttel and Ren{\'{e}} Rydhof Hansen}, editor = {Steve Kremer and Prakash Panangaden}, title = {Type Inference for Correspondence Types}, booktitle = {Proceedings of the 6th Workshop on Security Issues in Concurrency, SecCo@CONCUR 2008, Toronto, ON, Canada, August 23, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {242}, number = {3}, pages = {21--36}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.079}, doi = {10.1016/J.ENTCS.2009.07.079}, timestamp = {Fri, 24 Feb 2023 13:42:44 +0100}, biburl = {https://dblp.org/rec/journals/entcs/GordonHH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aplas/JonesH07, author = {Neil D. Jones and Ren{\'{e}} Rydhof Hansen}, editor = {Zhong Shao}, title = {The Semantics of "Semantic Patches" in Coccinelle: Program Transformation for the Working Programmer}, booktitle = {Programming Languages and Systems, 5th Asian Symposium, {APLAS} 2007, Singapore, November 29-December 1, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4807}, pages = {303--318}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76637-7\_21}, doi = {10.1007/978-3-540-76637-7\_21}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aplas/JonesH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/StuartHLAPM07, author = {Henrik Stuart and Ren{\'{e}} Rydhof Hansen and Julia L. Lawall and Jesper Andersen and Yoann Padioleau and Gilles Muller}, editor = {Eric Eide and Marc E. Fiuczynski}, title = {Towards easing the diagnosis of bugs in {OS} code}, booktitle = {Proceedings of the 4th workshop on Programming languages and operating systems, PLOS@SOSP 2007, Stevenson, Washington, USA, October 18, 2007}, pages = {2:1--2:5}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1376789.1376792}, doi = {10.1145/1376789.1376792}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sosp/StuartHLAPM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wollic/BolanderH07, author = {Thomas Bolander and Ren{\'{e}} Rydhof Hansen}, editor = {Daniel Leivant and Ruy J. G. B. de Queiroz}, title = {Hybrid Logical Analyses of the Ambient Calculus}, booktitle = {Logic, Language, Information and Computation, 14th International Workshop, WoLLIC 2007, Rio de Janeiro, Brazil, July 2-5, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4576}, pages = {83--100}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73445-1\_7}, doi = {10.1007/978-3-540-73445-1\_7}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wollic/BolanderH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/MullerPLH06, author = {Gilles Muller and Yoann Padioleau and Julia L. Lawall and Ren{\'{e}} Rydhof Hansen}, title = {Semantic patches considered helpful}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {40}, number = {3}, pages = {90--92}, year = {2006}, url = {https://doi.org/10.1145/1151374.1151392}, doi = {10.1145/1151374.1151392}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/MullerPLH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HansenPN06, author = {Ren{\'{e}} Rydhof Hansen and Christian W. Probst and Flemming Nielson}, title = {Sandboxing in myKlaim}, booktitle = {Proceedings of the The First International Conference on Availability, Reliability and Security, {ARES} 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria}, pages = {174--181}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ARES.2006.115}, doi = {10.1109/ARES.2006.115}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HansenPN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/PadioleauHLM06, author = {Yoann Padioleau and Ren{\'{e}} Rydhof Hansen and Julia L. Lawall and Gilles Muller}, editor = {Christian W. Probst}, title = {Semantic patches for documenting and automating collateral evolutions in Linux device drivers}, booktitle = {Proceedings of the 3rd Workshop on Programming Languages and Operating Systems: Linguistic Support for Modern Operating Systems, {PLOS} 2006, San Jose, California, USA, October 22, 2006}, pages = {10}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1215995.1216005}, doi = {10.1145/1215995.1216005}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asplos/PadioleauHLM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/ProbstHN06, author = {Christian W. Probst and Ren{\'{e}} Rydhof Hansen and Flemming Nielson}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Where Can an Insider Attack?}, booktitle = {Formal Aspects in Security and Trust, Fourth International Workshop, {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4691}, pages = {127--142}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-75227-1\_9}, doi = {10.1007/978-3-540-75227-1\_9}, timestamp = {Sun, 02 Oct 2022 16:07:30 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/ProbstHN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/SondergaardPJH06, author = {Dan S{\o}ndergaard and Christian W. Probst and Christian Damsgaard Jensen and Ren{\'{e}} Rydhof Hansen}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Program Partitioning Using Dynamic Trust Models}, booktitle = {Formal Aspects in Security and Trust, Fourth International Workshop, {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4691}, pages = {170--184}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-75227-1\_12}, doi = {10.1007/978-3-540-75227-1\_12}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/SondergaardPJH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/TolstrupNH06, author = {Terkel K. Tolstrup and Flemming Nielson and Ren{\'{e}} Rydhof Hansen}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Locality-Based Security Policies}, booktitle = {Formal Aspects in Security and Trust, Fourth International Workshop, {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4691}, pages = {185--201}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-75227-1\_13}, doi = {10.1007/978-3-540-75227-1\_13}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/TolstrupNH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/HansenS05, author = {Ren{\'{e}} Rydhof Hansen and Igor Siveroni}, editor = {Fausto Spoto}, title = {Towards Verification of Well-Formed Transactions in Java Card Bytecode}, booktitle = {Proceedings of the First Workshop on Bytecode Semantics, Verification, Analysis and Transformation, Bytecode@ETAPS 2005, Edinburgh, UK, April 9, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {141}, number = {1}, pages = {145--162}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.02.032}, doi = {10.1016/J.ENTCS.2005.02.032}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/HansenS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/Hansen04, author = {Ren{\'{e}} Rydhof Hansen}, editor = {David A. Schmidt}, title = {A Hardest Attacker for Leaking References}, booktitle = {Programming Languages and Systems, 13th European Symposium on Programming, {ESOP} 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2004, Barcelona, Spain, March 29 - April 2, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2986}, pages = {310--324}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24725-8\_22}, doi = {10.1007/978-3-540-24725-8\_22}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/esop/Hansen04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/NielsonNSBHPS04, author = {Flemming Nielson and Hanne Riis Nielson and Hongyan Sun and Mikael Buchholtz and Ren{\'{e}} Rydhof Hansen and Henrik Pilegaard and Helmut Seidl}, editor = {Kurt Jensen and Andreas Podelski}, title = {The Succinct Solver Suite}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems, 10th International Conference, {TACAS} 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2004, Barcelona, Spain, March 29 - April 2, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2988}, pages = {251--265}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24730-2\_21}, doi = {10.1007/978-3-540-24730-2\_21}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tacas/NielsonNSBHPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/NielsonHN03, author = {Flemming Nielson and Ren{\'{e}} Rydhof Hansen and Hanne Riis Nielson}, title = {Abstract interpretation of mobile ambients}, journal = {Sci. Comput. Program.}, volume = {47}, number = {2-3}, pages = {145--175}, year = {2003}, url = {https://doi.org/10.1016/S0167-6423(02)00131-4}, doi = {10.1016/S0167-6423(02)00131-4}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scp/NielsonHN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/NielsonNH02, author = {Flemming Nielson and Hanne Riis Nielson and Ren{\'{e}} Rydhof Hansen}, title = {Validating firewalls using flow logics}, journal = {Theor. Comput. Sci.}, volume = {283}, number = {2}, pages = {381--418}, year = {2002}, url = {https://doi.org/10.1016/S0304-3975(01)00140-2}, doi = {10.1016/S0304-3975(01)00140-2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/NielsonNH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/NielsonNHJ99, author = {Flemming Nielson and Hanne Riis Nielson and Ren{\'{e}} Rydhof Hansen and Jacob Grydholt Jensen}, editor = {Jos C. M. Baeten and Sjouke Mauw}, title = {Validating Firewalls in Mobile Ambients}, booktitle = {{CONCUR} '99: Concurrency Theory, 10th International Conference, Eindhoven, The Netherlands, August 24-27, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1664}, pages = {463--477}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48320-9\_32}, doi = {10.1007/3-540-48320-9\_32}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/concur/NielsonNHJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sas/HansenJNN99, author = {Ren{\'{e}} Rydhof Hansen and Jacob Grydholt Jensen and Flemming Nielson and Hanne Riis Nielson}, editor = {Agostino Cortesi and Gilberto Fil{\'{e}}}, title = {Abstract Interpretation of Mobile Ambients}, booktitle = {Static Analysis, 6th International Symposium, {SAS} '99, Venice, Italy, September 22-24, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1694}, pages = {134--148}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48294-6\_9}, doi = {10.1007/3-540-48294-6\_9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sas/HansenJNN99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.