Publisher
Springer Nature Switzerland
Reference24 articles.
1. Arias, J., Budde, C.E., Penczek, W., Petrucci, L., Sidoruk, T., Stoelinga, M.: Hackers vs. security: attack-defence trees as asynchronous multi-agent systems. In: Lin, SW., Hou, Z., Mahony, B. (eds.) Formal Methods and Software Engineering. ICFEM 2020. Lecture Notes in Computer Science(), vol. 12531. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-63406-3_1
2. ElaadNL: Smoothems met gridshield, elaad.nl/projecten/smoothems-met-gridshield/
3. Fang, X., Misra, S., Xue, G., Yang, D.: Smart grid - the new and improved power grid: a survey. IEEE Commun. Surv. Tutorials 14(4), 944–980 (2012). https://doi.org/10.1109/SURV.2011.101911.00087
4. Fila, B., Wideł, W.: Exploiting attack-defense trees to find an optimal set of countermeasures. In: 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), pp. 395–410 (2020). https://doi.org/10.1109/CSF49147.2020.00035
5. IEC, I.: 61025: Fault tree analysis (fta). Tech. rep., Technical Report (2006)