Author:
Mantel Heiko,Probst Christian W.
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Container security: Precaution levels, mitigation strategies, and research perspectives;Computers & Security;2023-12
2. Cyber Vulnerabilities in Blockchain Electronic Health Records: An In-Depth Threat Analysis;2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech);2023-11-14
3. Formal Template-Based Generation of Attack–Defence Trees for Automated Security Analysis;Information;2023-08-29
4. MergeTree: a Tree Model with Merged Nodes for Threat Induction;Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning;2023-03-17
5. tTree+: A Threat Tree Model for Representing Complex Semantics;2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2022-12