Author:
Kordy Barbara,Mauw Sjouke,Radomirović Saša,Schweitzer Patrick
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Vesely, W.E., Goldberg, F.F., Roberts, N., Haasl, D.: Fault Tree Handbook. Technical Report NUREG-0492, U.S. Regulatory Commission (1981)
2. Schneier, B.: Attack Trees. Dr. Dobb’s Journal of Software Tools 24(12), 21–29 (1999)
3. Lecture Notes in Computer Science;S. Mauw,2006
4. Lecture Notes in Computer Science;A. Jürgenson,2010
5. Edge, K.S., Dalton II, G.C., Raines, R.A., Mills, R.F.: Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security. In: Military Communications Conference, MILCOM 2006, pp. 1–7. IEEE, Los Alamitos (2006)
Cited by
154 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献