Author:
Gupta Sachin,Gupta Bhoomi,Rana Atul
Publisher
Springer Nature Singapore
Reference21 articles.
1. Herjavecgroup.com Official Annual Cyber Crime Report 2018. [online] Available at: https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf. Accessed 10 Oct 2021
2. B. Schneier, “Attack trees: modeling security threats,” Dr. Dobb’s Journal, December (1999)
3. I. Ray, N. Poolsapassit, Using attack trees to identify malicious attacks from authorized insiders. In Proceedings of the 10th European Conference on Research in Computer Security (ESORICS'05) (Springer, Berlin, Heidelberg, 2005), pp. 231–246. https://doi.org/10.1007/11555827_14
4. S. Mauw, M. Oostdijk, Foundations of attack trees. Lecture Notes Comput. Sci. 3935, 186–198 (2006). https://doi.org/10.1007/11734727_17
5. J. Stefan, M. Schumacher, Collaborative attack modeling. In Proc. SAC 2002 (ACM, 2002), pp. 253–259
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献