R. Kumar MSc (Rajesh)


Risk Analysis
Security Of Data
Model Checking


Kumar, R., Schivo, S., Ruijters, E. J. J., Yildiz, B. M., Huistra, D. J., Brandt, J., ... Stoelinga, M. I. A. (2018). Effective Analysis of Attack Trees: A Model-Driven Approach. In A. Russo, & A. Schürr (Eds.), Proceedings of the 21st International Conference on Fundamental Approaches to Software Engineering (FASE 2018) (pp. 56-73). (Lecture Notes in Computer Science; Vol. 10802). Springer. DOI: 10.1007/978-3-319-89363-1_4
Schivo, S., Yildiz, B. M., Ruijters, E. J. J., Gerking, C., Kumar, R., Dziwok, S., ... Stoelinga, M. I. A. (2017). How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach. In K. Larsen, O. Sokolsky, & J. Wang (Eds.), Dependable Software Engineering. Theories, Tools, and Applications: Third International Symposium, SETTA 2017, Changsha, China, October 23-25, 2017, Proceedings (pp. 319-336). (Lecture Notes in Computer Science; Vol. 10606), (Lecture Notes in Programming and Software Engineering). Springer. DOI: 10.1007/978-3-319-69483-2_19
Kumar, R., & Stoelinga, M. I. A. (2017). Quantitative security and safety analysis with attack-fault trees. In Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering (HASE 2017) (pp. 25-32). (HASE). IEEE. DOI: 10.1109/HASE.2017.12
Fraile, M., Ford, M., Gadyatskaya, O., Kumar, R., Stoelinga, M. I. A., & Trujillo-Rasua, R. (2016). Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study. In 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling (PoEM) (pp. 326-334). (Lecture Notes in Business Information Processing; Vol. 267). Berlin: Springer. DOI: 10.1007/978-3-319-48393-1_24
Kumar, R., Guck, D., & Stoelinga, M. I. A. (2015). Time dependent analysis with dynamic counter measure trees. In Proceedings of the 13th Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2015) (pp. 1-5). France: INRIA.
Kumar, R., Ruijters, E. J. J., & Stoelinga, M. I. A. (2015). Quantitative Attack Tree Analysis via Priced Timed Automata. In S. Sankaranarayanan, & E. Vicario (Eds.), Proceedings of the 13th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS 2015) (pp. 156-171). (Lecture Notes in Computer Science; Vol. 9268). Zurich: Springer International Publishing. DOI: 10.1007/978-3-319-22975-1_11
Arnold, F., Guck, D., Kumar, R., & Stoelinga, M. I. A. (2015). Sequential and Parallel Attack Tree Modelling. In F. Koornneef, & C. van Gulijk (Eds.), Computer Safety, Reliability, and Security - Proceedings of the SAFECOM 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR (pp. 291-299). (Lecture Notes in Computer Science; Vol. 9338). Zurich: Springer Verlag. DOI: 10.1007/978-3-319-24249-1_25

Contact Details

Visiting Address

University of Twente
Drienerlolaan 5
7522 NB Enschede
The Netherlands

Navigate to location

Mailing Address

University of Twente
P.O. Box 217
7500 AE Enschede
The Netherlands