A review of attack graph and attack tree visual syntax in cyber security
DOI10.1016/j.cosrev.2019.100219zbMath1477.68060OpenAlexW2997353660WikidataQ115045607 ScholiaQ115045607MaRDI QIDQ2197794
Jay Bal, Harjinder Singh Lallie, Kurt Debattista
Publication date: 1 September 2020
Published in: Computer Science Review (Search for Journal in Brave)
Full work available at URL: http://wrap.warwick.ac.uk/131160/7/WRAP-review-attack-graph-attack-tree-visual-syntax-cyber-security-Lallie-2019.pdf
Graph theory (including graph drawing) in computer science (68R10) Research exposition (monographs, survey articles) pertaining to computer science (68-02) Computer security (68M25)
Related Items (5)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker model
- DAG-based attack and defense modeling: don't miss the forest for the attack trees
- Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
- New Efficient Utility Upper Bounds for the Fully Adaptive Model of Attack Trees
- Approximate Solutions for Attack Graph Games with Imperfect Information
- Dynamic fault-tree models for fault-tolerant computer systems
- Upper Bounds for Adversaries’ Utility in Attack Trees
- Formal Methods for Components and Objects
- Information Security and Cryptology - ICISC 2005
- Cognitive science approaches to understanding diagrammatic representations
This page was built for publication: A review of attack graph and attack tree visual syntax in cyber security