| Publication | Date of Publication | Type |
|---|
| Lightweight information flow | 2024-02-23 | Paper |
| Multi-valued logic for static analysis and model checking | 2023-08-02 | Paper |
| Process-local static analysis of synchronous processes | 2023-05-26 | Paper |
| Time dependent policy-based access control | 2023-02-03 | Paper |
| Factorization of behavioral integrity | 2022-08-19 | Paper |
| Static and dynamic processor allocation for higher-order concurrent languages | 2022-08-18 | Paper |
| Constraints for polymorphic behaviours of concurrent ML | 2022-08-16 | Paper |
| Benign interaction of security domains | 2022-07-13 | Paper |
| Static analysis for proactive security | 2022-02-16 | Paper |
| Semantics-directed program analysis: A tool-maker's perspective | 2022-02-16 | Paper |
| Formal Methods | 2021-11-16 | Paper |
| Disjunctive Information Flow for Communicating Processes | 2021-04-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4965812 | 2021-03-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4963912 | 2021-02-24 | Paper |
| Model Checking Exact Cost for Attack Scenarios | 2020-08-03 | Paper |
| Secure Guarded Commands | 2020-07-20 | Paper |
| Information Flow for Timed Automata | 2020-02-24 | Paper |
| Secure information release in timed automata | 2019-09-16 | Paper |
| A parametric abstract domain for lattice-valued regular expressions | 2018-08-27 | Paper |
| A monotone framework for CCS | 2018-05-16 | Paper |
| Systematic realisation of control flow analyses for CML | 2017-08-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2980974 | 2017-05-08 | Paper |
| Discovering, quantifying, and displaying attacks | 2017-04-11 | Paper |
| Content dependent information flow control | 2017-02-22 | Paper |
| Enforcing Availability in Failure-Aware Communicating Systems | 2016-10-19 | Paper |
| Hoare Logic for Disjunctive Information Flow | 2016-01-08 | Paper |
| Modal abstractions of concurrent behavior | 2015-09-17 | Paper |
| Discretionary Information Flow Control for Interaction-Oriented Specifications | 2015-09-14 | Paper |
| A calculus of quality for robustness against unreliable communication | 2015-08-21 | Paper |
| Stochastic Model Checking of the Stochastic Quality Calculus | 2015-06-22 | Paper |
| Shape analysis for mobile ambients | 2015-03-17 | Paper |
| Flow logic for process calculi | 2014-08-13 | Paper |
| Active evaluation contexts for reaction semantics | 2013-12-13 | Paper |
| Heuristics for safety and security constraints | 2013-12-06 | Paper |
| Performance evaluation of security protocols specified in LySa | 2013-09-20 | Paper |
| XACML 3.0 in Answer Set Programming | 2013-09-13 | Paper |
| Safety versus Security in the Quality Calculus | 2013-08-16 | Paper |
| Lazy Mobile Intruders | 2013-08-06 | Paper |
| Reachability for finite-state process algebras using Horn clauses | 2013-07-30 | Paper |
| Cryptographic analysis in cubic time | 2013-07-24 | Paper |
| Bisimulations Meet PCTL Equivalences for Probabilistic Automata | 2013-06-24 | Paper |
| Efficient CSL model checking using stratification | 2012-08-15 | Paper |
| Static analysis of IMC | 2012-08-14 | Paper |
| \textsf{CaPiTo}: Protocol stacks for services | 2011-10-18 | Paper |
| Reachability for Finite-State Process Algebras Using Static Analysis | 2011-10-07 | Paper |
| Automata-Based CSL Model Checking | 2011-07-07 | Paper |
| From flow logic to static type systems for coordination languages | 2010-04-29 | Paper |
| Model Checking Is Static Analysis of Modal Logic | 2010-04-27 | Paper |
| What is a free name in a process algebra? | 2010-03-24 | Paper |
| Static analysis of topology-dependent broadcast networks | 2010-02-26 | Paper |
| Foundations of Security Analysis and Design II | 2009-05-14 | Paper |
| A Scalable Inclusion Constraint Solver Using Unification | 2009-01-22 | Paper |
| Pathway analysis for BioAmbients | 2008-11-06 | Paper |
| Topology-Dependent Abstractions of Broadcast Networks | 2008-09-18 | Paper |
| Modal Abstractions of Concurrent Behaviour | 2008-08-28 | Paper |
| Relational Analysis of Correlation | 2008-08-28 | Paper |
| Iterative Specialisation of Horn Clauses | 2008-04-11 | Paper |
| Tools and Algorithms for the Construction and Analysis of Systems | 2007-09-28 | Paper |
| Data Flow Analysis for CCS | 2007-09-24 | Paper |
| Types from Control Flow Analysis | 2007-09-24 | Paper |
| Semantics with applications: an appetizer. | 2007-06-07 | Paper |
| Static Analysis | 2005-08-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4671219 | 2005-04-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4654726 | 2005-03-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4738360 | 2004-08-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4437807 | 2003-12-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4430311 | 2003-10-20 | Paper |
| Abstract interpretation of mobile ambients. | 2003-08-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4414732 | 2003-07-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4411948 | 2003-07-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4790411 | 2003-06-02 | Paper |
| Static analysis for the \(\pi\)-calculus with applications to security | 2003-01-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4779098 | 2002-11-24 | Paper |
| Validating firewalls using flow logics | 2002-07-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2763677 | 2002-01-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2729057 | 2001-11-06 | Paper |
| Shape analysis for mobile ambients | 2001-10-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4505701 | 2001-09-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4494378 | 2000-08-10 | Paper |
| Using transformations in the implementation of higher-order functions | 2000-02-09 | Paper |
| Strictness and totality analysis | 2000-01-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4255591 | 1999-08-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4222938 | 1999-01-06 | Paper |
| Behavior analysis for validating communication patterns | 1998-01-01 | Paper |
| Type and behaviour reconstruction for higher-order concurrent programs | 1997-09-29 | Paper |
| From CML to its process algebra | 1997-02-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4895544 | 1996-10-14 | Paper |
| The tensor product in Wadler's analysis of lists | 1994-07-21 | Paper |
| Bounded Fixed-Point Iteration | 1993-06-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4038668 | 1993-05-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4023828 | 1993-01-23 | Paper |
| Two-Level Functional Languages | 1993-01-23 | Paper |
| Functional completeness of the mixed \(\lambda\)-calculus and combinatory logic | 1990-01-01 | Paper |
| Two-level semantics and abstract interpretation | 1989-01-01 | Paper |
| Two-level semantics and code generation | 1988-01-01 | Paper |
| Strictness analysis and denotational abstract interpretation | 1988-01-01 | Paper |
| Automatic binding time analysis for a typed \(\lambda\)-calculus | 1988-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3713564 | 1986-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3718132 | 1986-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3709854 | 1986-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3709882 | 1986-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3713560 | 1986-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3718128 | 1986-01-01 | Paper |
| Program transformations in a denotational setting | 1985-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3664406 | 1983-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3316559 | 1983-01-01 | Paper |
| A denotational framework for data flow analysis | 1982-01-01 | Paper |