Publisher
Springer International Publishing
Reference16 articles.
1. Baheti, R., Gill, H.: Cyber-physical systems. Impact Control Technol. 1(12), 161–166 (2011)
2. de Oliveira Albuquerque, R., Villalba, L.J.G., Orozco, A.L.S., Buiati, F., Kim, T.-H.: A layered trust information security architecture. Sensors 14(12), 22754–22772 (2014)
3. Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21–29 (1999)
4. Lecture Notes in Computer Science;S Mauw,2006
5. Henzinger, T.A.: The theory of hybrid automata. In: Inan, M.K., Kurshan, R.P. (eds.) Verification of Digital and Hybrid Systems. NATO ASI Series (Series F: Computer and Systems Sciences), vol. 170. Springer, Heidelberg (2000). https://doi.org/10.1007/978-3-642-59615-5_13
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework;Applied Sciences;2023-11-25
2. Timed Automata as a Formalism for Expressing Security: A Survey on Theory and Practice;ACM Computing Surveys;2022-12-07
3. Dynamic Attack Trees Methodology;2022 Interdisciplinary Research in Technology and Management (IRTM);2022-02-24
4. States of Attack Under Incomplete Information;2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC);2022-01-26
5. Reversible Attack Trees;2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON);2021-12-01