Author:
Bourget Edwin,Cuppens Frédéric,Cuppens-Boulahia Nora,Dubus Samuel,Foley Simon,Laarouchi Youssef
Publisher
Springer International Publishing
Reference19 articles.
1. Vesely, W.E., Goldberg, F.F., Roberts, N.H., Haasl, D.F.: Fault tree handbook. Report, DTIC Document (1981)
2. Bruce, S.: Attack trees. Dr. Dobb’s J. 24, 21–29 (1999)
3. Frigault, M., Wang, L., Singhal, A., Jajodia, S.: Measuring network security using dynamic Bayesian network. In: Proceedings of the 4th ACM Workshop on Quality of Protection, 1456368, pp. 23–30. ACM (2008)
4. Kumar, S., Spafford, E.: A pattern matching model for misuse intrusion detection (1994)
5. Bouissou, M., Bon, J.L.: A new formalism that combines advantages of fault-trees and Markov models: Boolean logic driven Markov processes. Mater. Reliab. Eng. Syst. Saf. 82(2), 149–163 (2003)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献