D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 33 Citations 5,255 232 World Ranking 8623 National Ranking 12

Overview

What is he best known for?

The fields of study he is best known for:

  • Programming language
  • Operating system
  • Computer security

His primary areas of investigation include Computer security, Semantics, Theoretical computer science, Cryptographic protocol and Attack tree. His Computer security research is multidisciplinary, incorporating elements of Semantics and Formal methods. The concepts of his Semantics study are interwoven with issues in Process calculus, Alternating bit protocol, Relation, Specification and Description Language and Control flow.

His work deals with themes such as Sublanguage, Formal semantics and Operational semantics, Denotational semantics, which intersect with Theoretical computer science. He has researched Cryptographic protocol in several fields, including Computer security model, Authentication and Component. His work carried out in the field of Attack tree brings together such families of science as Discrete mathematics, Intrusion detection system and Attribute domain.

His most cited work include:

  • Foundations of attack trees (369 citations)
  • Message Sequence Chart (MSC) (277 citations)
  • Foundations of attack-defense trees (155 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer security, Theoretical computer science, Programming language, Cryptographic protocol and Semantics. His Computer security research includes elements of Protocol, Internet privacy and Social graph. His Protocol research is under the purview of Computer network.

His Theoretical computer science research integrates issues from Structure and Attack tree. His work in Formal semantics, Operational semantics, Process calculus, Specification language and Algebraic specification are all subfields of Programming language research. His research integrates issues of Formal methods and Formal verification in his study of Cryptographic protocol.

He most often published in these fields:

  • Computer security (28.57%)
  • Theoretical computer science (18.37%)
  • Programming language (13.06%)

What were the highlights of his more recent work (between 2012-2021)?

  • Computer security (28.57%)
  • Theoretical computer science (18.37%)
  • Graph (2.86%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in Computer security, Theoretical computer science, Graph, Semantics and Computer security model. Sjouke Mauw works on Computer security which deals in particular with Cryptographic protocol. His Theoretical computer science study combines topics in areas such as Structure and Set.

His studies deal with areas such as Adjacency list and Anonymity as well as Graph. He has included themes like Tree, Complete information, Node and Linear logic in his Semantics study. His Computer security model research is multidisciplinary, relying on both Software, Order, Risk management and Subject.

Between 2012 and 2021, his most popular works were:

  • Attack-Defense Trees (106 citations)
  • ADTool: security analysis with attack---defense trees (56 citations)
  • Attack Trees with Sequential Conjunction (54 citations)

In his most recent research, the most cited papers focused on:

  • Programming language
  • Operating system
  • Computer security

Sjouke Mauw focuses on Computer security, Theoretical computer science, Attack tree, Discrete mathematics and Graph. The study incorporates disciplines such as Robustness, Social graph and Internet privacy in addition to Computer security. His biological study spans a wide range of topics, including Timestamp, System model and Security analyst.

Sjouke Mauw interconnects Process, Attribute domain, Domain class, Open source software and Operations research in the investigation of issues within Attack tree. His biological study spans a wide range of topics, including Adjacency list and Anonymity. His work in Cryptographic protocol covers topics such as Bounding overwatch which are related to areas like Formal verification.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Foundations of attack trees

Sjouke Mauw;Martijn Oostdijk.
international conference on information security and cryptology (2005)

597 Citations

Foundations of attack trees

Sjouke Mauw;Martijn Oostdijk.
international conference on information security and cryptology (2005)

597 Citations

Message Sequence Chart (MSC)

S. Mauw.
Draft Recommandation Z. 120 (1996)

417 Citations

Message Sequence Chart (MSC)

S. Mauw.
Draft Recommandation Z. 120 (1996)

417 Citations

Foundations of attack-defense trees

Barbara Kordy;Sjouke Mauw;Saša Radomirović;Patrick Schweitzer.
formal aspects in security and trust (2010)

298 Citations

Foundations of attack-defense trees

Barbara Kordy;Sjouke Mauw;Saša Radomirović;Patrick Schweitzer.
formal aspects in security and trust (2010)

298 Citations

An algebraic semantics of basic message sequence charts

S Sjouke Mauw;MA Michel Reniers.
The Computer Journal (1994)

220 Citations

An algebraic semantics of basic message sequence charts

S Sjouke Mauw;MA Michel Reniers.
The Computer Journal (1994)

220 Citations

Formal Test Automation: A Simple Experiment

Axel Belinfante;Jan Feenstra;René G. de Vries;Jan Tretmans.
Proceedings of the IFIP TC6 12th International Workshop on Testing Communicating Systems: Method and Applications (1999)

187 Citations

Formal Test Automation: A Simple Experiment

Axel Belinfante;Jan Feenstra;René G. de Vries;Jan Tretmans.
Proceedings of the IFIP TC6 12th International Workshop on Testing Communicating Systems: Method and Applications (1999)

187 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Sjouke Mauw

Jan A. Bergstra

Jan A. Bergstra

University of Amsterdam

Publications: 28

Cas Cremers

Cas Cremers

University of Oxford

Publications: 25

Jan Friso Groote

Jan Friso Groote

Eindhoven University of Technology

Publications: 23

Joshua Guttman

Joshua Guttman

Worcester Polytechnic Institute

Publications: 20

Selwyn Piramuthu

Selwyn Piramuthu

University of Florida

Publications: 16

David Basin

David Basin

ETH Zurich

Publications: 15

Wan Fokkink

Wan Fokkink

Vrije Universiteit Amsterdam

Publications: 14

Marjan Mernik

Marjan Mernik

University of Maribor

Publications: 12

Kim Guldstrand Larsen

Kim Guldstrand Larsen

Aalborg University

Publications: 12

Alexander Pretschner

Alexander Pretschner

Technical University of Munich

Publications: 12

Doron Peled

Doron Peled

Bar-Ilan University

Publications: 11

Holger Hermanns

Holger Hermanns

Saarland University

Publications: 11

Robert M. Hierons

Robert M. Hierons

University of Sheffield

Publications: 10

Daniel Amyot

Daniel Amyot

University of Ottawa

Publications: 10

Mats P. E. Heimdahl

Mats P. E. Heimdahl

University of Minnesota

Publications: 9

Claude Jard

Claude Jard

University of Nantes

Publications: 8

Trending Scientists

Yasushi Yagi

Yasushi Yagi

Osaka University

Michael T. Orchard

Michael T. Orchard

Rice University

Xin Li

Xin Li

University of British Columbia

Jonathan M. Jeschke

Jonathan M. Jeschke

Freie Universität Berlin

Malcolm B. Jones

Malcolm B. Jones

Plymouth University

U. Rashid Sumaila

U. Rashid Sumaila

University of British Columbia

Paul Dent

Paul Dent

Virginia Commonwealth University

Michael R. Blatt

Michael R. Blatt

University of Glasgow

Robert J. Lee

Robert J. Lee

University of Pennsylvania

Anatoly M. Lysenko

Anatoly M. Lysenko

Russian Academy of Sciences

Jianmin Ma

Jianmin Ma

Peking University

Scott E. Hemby

Scott E. Hemby

High Point University

Donald S. Burke

Donald S. Burke

University of Pittsburgh

Charles Grose

Charles Grose

University of Iowa

Masataka Kuwana

Masataka Kuwana

Nippon Medical School

Walter O. Bockting

Walter O. Bockting

Columbia University

Something went wrong. Please try again later.