Attack trees vs. fault trees: two sides of the same coin from different currencies
From MaRDI portal
Publication:832098
DOI10.1007/978-3-030-85172-9_24zbMath1491.68035OpenAlexW3193789558MaRDI QIDQ832098
Christina Kolb, Carlos E. Budde, Mariëlle I. A. Stoelinga
Publication date: 24 March 2022
Full work available at URL: https://research.utwente.nl/en/publications/attack-trees-vs-fault-trees(8457608b-42d7-47b4-afef-b1c23de6dba3).html
Reliability, testing and fault tolerance of networks and computer systems (68M15) Computer security (68M25)
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- DAG-based attack and defense modeling: don't miss the forest for the attack trees
- Fault tree analysis: a survey of the state-of-the-art in modeling, analysis and tools
- Quantitative Attack Tree Analysis via Priced Timed Automata
- Fault Tree Analysis, Methods, and Applications ߝ A Review
- Information Security and Cryptology - ICISC 2005
This page was built for publication: Attack trees vs. fault trees: two sides of the same coin from different currencies