1. “Analyzing the security in the GSM radio network using attack jungles,”6074
AbdullaP. A.
CederbergJ.
KaatiL.
MargariaT.
SteffenB.
Berlin, HeidelbergSpringer Berlin HeidelbergLeveraging Applications of Formal Methods, Verification, and Validation, Vol. 64152010
2. The STRIDE Threat Model2009
3. “On the soundness of attack trees,”2538
AudinotM.
PinchinatS.
KordyB.
EkstedtM.
KimD. S.
ChamSpringer International PublishingGraphical Models for Security, Vol. 99872016
4. Is my attack tree correct? Extended version;Audinot;arXiv,2017
5. “Strategic games on defense trees,”115
BistarelliS.
Dall'AglioM.
PerettiP.
DimitrakosT.
MartinelliF.
RyanP. Y. A.
SchneiderS.
Berlin, HeidelbergSpringer Berlin HeidelbergFormal Aspects in Security and Trust, Vol. 46912007