Author:
Fraile Marlon,Ford Margaret,Gadyatskaya Olga,Kumar Rajesh,Stoelinga Mariëlle,Trujillo-Rasua Rolando
Publisher
Springer International Publishing
Reference18 articles.
1. Bagnato, A., Kordy, B., Meland, P.H., Schweitzer, P.: Attribute decoration of attack-defense trees. Int. J. Secure Softw. Eng. 3(2), 1–35 (2012)
2. Byres, E.J., Franz, M., Miller, D.: The use of attack trees in assessing vulnerabilities in SCADA systems. In: Proceedings of the International Infrastructure Survivability Workshop (2004)
3. SpringerBriefs in Computer Science;S Du,2013
4. Edge, K., Raines, R., Grimaila, M., Baldwin, R., Bennington, R., Reuter, C.: The use of attack and protection trees to analyze security for an online banking system. In: Proceedings of HICSS. IEEE Computer Society (2007)
5. Lecture Notes in Computer Science;O Gadyatskaya,2016
Cited by
40 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献