Author:
Beckers Kristian,Heisel Maritta,Krautsevich Leanid,Martinelli Fabio,Meis Rene,Yautsiukhin Artsiom
Publisher
Springer International Publishing
Reference19 articles.
1. Lecture Notes in Computer Science;Yudistira Asnar,2011
2. Lecture Notes in Computer Science;K Beckers,2014
3. Beckers, K., Côté, I., Hatebur, D., Faßbender, S., Heisel, M.: Common Criteria CompliAnt Software Development (CC-CASD). In: Proceedings of 28th SAC, pp. 937–943. ACM (2013)
4. Bistarelli, S., Fioravanti, F., Peretti, P.: Defense trees for economic evaluation of security investments. In: Proceedings of the 1st ARES, pp. 416–423. IEEE (2006)
5. Dalton II, G.C., Colombi, J.M., Mills, R.F., Raines, R.A.: Analyzing attack trees using generalized stochastic petri nets. In: Proceedings of the IAS, pp. 116–123. IEEE (2006)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献