Publications

Export 8 results:
[ Author(Asc)] Title Type Year
Filters: Keyword is attack trees  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Pieters W., Davarynejad M..  2015.  Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers. 9th International Workshop on Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance (DPM), Wroclaw, Poland. 8872:201–215.
K
Kumar R., Guck D., Stoelinga M.IA.  2015.  Time dependent analysis with dynamic counter measure trees. Proceedings of the 13th Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2015), London, England.
Kumar R., Ruijters E.JJ, Stoelinga M.IA.  2015.  Quantitative Attack Tree Analysis via Priced Timed Automata. Proceedings of the 13th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2015, Madrid, Spain. 9268:156–171.
Kordy B.K, Piètre-Cambacédès L., Schweitzer P..  2015.  DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees. Computer Science Review. 13-14:1–38.
Kordy B.K, Piètre-Cambacédès L., Schweitzer P..  2014.  DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees. Computer Science Review. 13-14:1–38.
D
David N., David A., Hansen R.R, Larsen K.G, Legay A., Olesen M.C, Probst C.W.  2015.  Modelling Social-Technical Attacks with Timed Automata. Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Denver, Colorado, US. :21–28.
A
Arnold F., Hermanns H., Pulungan R., Stoelinga M.IA.  2014.  Time-dependent analysis of attacks. Proceedings of the Third International Conference on Principles and Security of Trust, POST 2014, Grenoble, France. 8414:285–305.