Information Security and Cryptology - ICISC 2005
From MaRDI portal
Publication:5899289
DOI10.1007/11734727zbMath1185.94058OpenAlexW2493058093MaRDI QIDQ5899289
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11734727
Related Items (9)
Assessing security of cryptocurrencies with attack-defense trees: proof of concept and future directions ⋮ The marriage between safety and cybersecurity: still practicing ⋮ Attack trees vs. fault trees: two sides of the same coin from different currencies ⋮ Is my attack tree correct? ⋮ Probabilistic reasoning with graphical security models ⋮ Quantitative Attack Tree Analysis via Priced Timed Automata ⋮ A review of attack graph and attack tree visual syntax in cyber security ⋮ Unnamed Item ⋮ DAG-based attack and defense modeling: don't miss the forest for the attack trees
This page was built for publication: Information Security and Cryptology - ICISC 2005