Author of the publication

The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement.

, , and . GraMSec@FLoC, volume 11086 of Lecture Notes in Computer Science, page 90-110. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructing weak simulations from linear implications for processes with private names., and . Math. Struct. Comput. Sci., 29 (8): 1275-1308 (2019)On the Correspondence between Display Postulates and Deep Inference in Nested Sequent Calculi for Tense Logics, , and . Logical Methods in Computer Science, (2011)A Local System for Intuitionistic Logic.. LPAR, volume 4246 of Lecture Notes in Computer Science, page 242-256. Springer, (2006)Compositional Reasoning for Shared-Variable Concurrent Programs., , , , , , and . FM, volume 10951 of Lecture Notes in Computer Science, page 523-541. Springer, (2018)Dagster: Parallel Structured Search with Case Studies., , , , , and . PRICAI (1), volume 13629 of Lecture Notes in Computer Science, page 75-89. Springer, (2022)Extracting Proofs from Tabled Proof Search., and . CPP, volume 8307 of Lecture Notes in Computer Science, page 194-210. Springer, (2013)Grammar Logics in Nested Sequent Calculus: Proof Theory and Decision Procedures., , and . Advances in Modal Logic, page 516-537. College Publications, (2012)Annotation-Free Sequent Calculi for Full Intuitionistic Linear Logic., , , and . CSL, volume 23 of LIPIcs, page 197-214. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2013)A Labelled Sequent Calculus for BBI: Proof Theory and Proof Search., , and . TABLEAUX, volume 8123 of Lecture Notes in Computer Science, page 172-187. Springer, (2013)A Hypersequent System for Gödel-Dummett Logic with Non-constant Domains.. TABLEAUX, volume 6793 of Lecture Notes in Computer Science, page 248-262. Springer, (2011)