R. Kumar MSc (Rajesh)




Kumar, R., Schivo, S., Ruijters, E. J. J., Yildiz, B. M., Huistra, D. J., Brandt, J., ... Stoelinga, M. I. A. (2018). Effective Analysis of Attack Trees: A Model-Driven Approach. In A. Russo, & A. Schürr (Eds.), Proceedings of the 21st International Conference on Fundamental Approaches to Software Engineering (FASE 2018) (pp. 56-73). (Lecture Notes in Computer Science; Vol. 10802). Springer. DOI: 10.1007/978-3-319-89363-1_4
Schivo, S., Yildiz, B. M., Ruijters, E. J. J., Gerking, C., Kumar, R., Dziwok, S., ... Stoelinga, M. I. A. (2017). How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach. In K. Larsen, O. Sokolsky, & J. Wang (Eds.), Dependable Software Engineering. Theories, Tools, and Applications: Third International Symposium, SETTA 2017, Changsha, China, October 23-25, 2017, Proceedings (pp. 319-336). (Lecture Notes in Computer Science; Vol. 10606), (Lecture Notes in Programming and Software Engineering). Springer. DOI: 10.1007/978-3-319-69483-2_19
Kumar, R., & Stoelinga, M. I. A. (2017). Quantitative security and safety analysis with attack-fault trees. In Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering (HASE 2017) (pp. 25-32). (HASE). IEEE. DOI: 10.1109/HASE.2017.12
Fraile, M., Ford, M., Gadyatskaya, O., Kumar, R., Stoelinga, M. I. A., & Trujillo-Rasua, R. (2016). Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study. In 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling (PoEM) (pp. 326-334). (Lecture Notes in Business Information Processing; Vol. 267). Berlin: Springer. DOI: 10.1007/978-3-319-48393-1_24
Kumar, R., Guck, D., & Stoelinga, M. I. A. (2015). Time dependent analysis with dynamic counter measure trees. In Proceedings of the 13th Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2015) (pp. 1-5). France: INRIA.
Kumar, R., Ruijters, E. J. J., & Stoelinga, M. I. A. (2015). Quantitative Attack Tree Analysis via Priced Timed Automata. In S. Sankaranarayanan, & E. Vicario (Eds.), Proceedings of the 13th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS 2015) (pp. 156-171). (Lecture Notes in Computer Science; Vol. 9268). Zurich: Springer International Publishing. DOI: 10.1007/978-3-319-22975-1_11
Arnold, F., Guck, D., Kumar, R., & Stoelinga, M. I. A. (2015). Sequential and Parallel Attack Tree Modelling. In F. Koornneef, & C. van Gulijk (Eds.), Computer Safety, Reliability, and Security - Proceedings of the SAFECOM 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR (pp. 291-299). (Lecture Notes in Computer Science; Vol. 9338). Zurich: Springer Verlag. DOI: 10.1007/978-3-319-24249-1_25

Contact Details

Visiting Address

University of Twente
Drienerlolaan 5
7522 NB Enschede
The Netherlands

Navigate to location

Mailing Address

University of Twente
P.O. Box 217
7500 AE Enschede
The Netherlands