Author:
Audinot Maxime,Pinchinat Sophie,Kordy Barbara
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Dynamic logic-based attack graph for risk assessment in complex computer systems;Computer Networks;2023-06
2. Formalizing Attack Tree on Security Object for MySANi in Legal Metrology;Systems;2023-01-16
3. tTree+: A Threat Tree Model for Representing Complex Semantics;2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2022-12
4. Towards Automated Assessment of Vulnerability Exposures in Security Operations;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2021
5. Beyond 2014;ACM Computing Surveys;2020-07-31