His primary areas of investigation include Computer security, Semantics, Theoretical computer science, Cryptographic protocol and Attack tree. His Computer security research is multidisciplinary, incorporating elements of Semantics and Formal methods. The concepts of his Semantics study are interwoven with issues in Process calculus, Alternating bit protocol, Relation, Specification and Description Language and Control flow.
His work deals with themes such as Sublanguage, Formal semantics and Operational semantics, Denotational semantics, which intersect with Theoretical computer science. He has researched Cryptographic protocol in several fields, including Computer security model, Authentication and Component. His work carried out in the field of Attack tree brings together such families of science as Discrete mathematics, Intrusion detection system and Attribute domain.
His primary areas of study are Computer security, Theoretical computer science, Programming language, Cryptographic protocol and Semantics. His Computer security research includes elements of Protocol, Internet privacy and Social graph. His Protocol research is under the purview of Computer network.
His Theoretical computer science research integrates issues from Structure and Attack tree. His work in Formal semantics, Operational semantics, Process calculus, Specification language and Algebraic specification are all subfields of Programming language research. His research integrates issues of Formal methods and Formal verification in his study of Cryptographic protocol.
His scientific interests lie mostly in Computer security, Theoretical computer science, Graph, Semantics and Computer security model. Sjouke Mauw works on Computer security which deals in particular with Cryptographic protocol. His Theoretical computer science study combines topics in areas such as Structure and Set.
His studies deal with areas such as Adjacency list and Anonymity as well as Graph. He has included themes like Tree, Complete information, Node and Linear logic in his Semantics study. His Computer security model research is multidisciplinary, relying on both Software, Order, Risk management and Subject.
Sjouke Mauw focuses on Computer security, Theoretical computer science, Attack tree, Discrete mathematics and Graph. The study incorporates disciplines such as Robustness, Social graph and Internet privacy in addition to Computer security. His biological study spans a wide range of topics, including Timestamp, System model and Security analyst.
Sjouke Mauw interconnects Process, Attribute domain, Domain class, Open source software and Operations research in the investigation of issues within Attack tree. His biological study spans a wide range of topics, including Adjacency list and Anonymity. His work in Cryptographic protocol covers topics such as Bounding overwatch which are related to areas like Formal verification.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Foundations of attack trees
Sjouke Mauw;Martijn Oostdijk.
international conference on information security and cryptology (2005)
Foundations of attack trees
Sjouke Mauw;Martijn Oostdijk.
international conference on information security and cryptology (2005)
Message Sequence Chart (MSC)
S. Mauw.
Draft Recommandation Z. 120 (1996)
Message Sequence Chart (MSC)
S. Mauw.
Draft Recommandation Z. 120 (1996)
Foundations of attack-defense trees
Barbara Kordy;Sjouke Mauw;Saša Radomirović;Patrick Schweitzer.
formal aspects in security and trust (2010)
Foundations of attack-defense trees
Barbara Kordy;Sjouke Mauw;Saša Radomirović;Patrick Schweitzer.
formal aspects in security and trust (2010)
An algebraic semantics of basic message sequence charts
S Sjouke Mauw;MA Michel Reniers.
The Computer Journal (1994)
An algebraic semantics of basic message sequence charts
S Sjouke Mauw;MA Michel Reniers.
The Computer Journal (1994)
Formal Test Automation: A Simple Experiment
Axel Belinfante;Jan Feenstra;René G. de Vries;Jan Tretmans.
Proceedings of the IFIP TC6 12th International Workshop on Testing Communicating Systems: Method and Applications (1999)
Formal Test Automation: A Simple Experiment
Axel Belinfante;Jan Feenstra;René G. de Vries;Jan Tretmans.
Proceedings of the IFIP TC6 12th International Workshop on Testing Communicating Systems: Method and Applications (1999)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Oxford
Eindhoven University of Technology
RWTH Aachen University
University of Amsterdam
Nanyang Technological University
University of Florida
Centre national de la recherche scientifique, CNRS
Eindhoven University of Technology
Vrije Universiteit Amsterdam
University of Saskatchewan
Osaka University
Rice University
University of British Columbia
Freie Universität Berlin
Plymouth University
University of British Columbia
Virginia Commonwealth University
University of Glasgow
University of Pennsylvania
Russian Academy of Sciences
Peking University
High Point University
University of Pittsburgh
University of Iowa
Nippon Medical School
Columbia University