Is my attack tree correct?
From MaRDI portal
Publication:2167713
DOI10.1007/978-3-319-66402-6_7zbMath1496.68054arXiv1706.08507OpenAlexW2744888375MaRDI QIDQ2167713
Barbara Kordy, Maxime Audinot, Sophie Pinchinat
Publication date: 25 August 2022
Full work available at URL: https://arxiv.org/abs/1706.08507
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- DAG-based attack and defense modeling: don't miss the forest for the attack trees
- Probabilistic reasoning with graphical security models
- Quantitative Attack Tree Analysis via Priced Timed Automata
- Model Checking Exact Cost for Attack Scenarios
- Semantics for Specialising Attack Trees based on Linear Logic
- Modelling Attack-defense Trees Using Timed Automata
- Attack-defense trees
- The complexity of theorem-proving procedures
- Information Security and Cryptology - ICISC 2005
This page was built for publication: Is my attack tree correct?