Author:
Gadyatskaya Olga,Trujillo-Rasua Rolando
Publisher
Springer International Publishing
Reference68 articles.
1. Amenaza: Creating secure systems through attack tree modeling (2003). http://www.amenaza.com/
2. ANSSI: EBIOS – Expression des Besoins et Identification des Objectifs de Securite (2010)
3. Arnold, F., Guck, D., Kumar, R., Stoelinga, M.: Sequential and parallel attack tree modelling. In: Proceedings of SAFECOMP and Workshops, pp. 291–299 (2015)
4. Lecture Notes in Computer Science;Z Aslanyan,2015
5. Aslanyan, Z., Nielson, F., Parker, D.: Quantitative verification and synthesis of attack-defence scenarios. In: Proceedings of CSF. IEEE (2016)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献