Transforming Graphical System Models to Graphical Attack Models
暂无分享,去创建一个
Florian Kammüller | Christian W. Probst | René Rydhof Hansen | Marieta Georgieva Ivanova | C. Probst | M. Ivanova | F. Kammüller
[1] Florian Kammüller,et al. Invalidating Policies using Structural Information , 2013, 2013 IEEE Security and Privacy Workshops.
[2] Flemming Nielson,et al. Where Can an Insider Attack? , 2006, Formal Aspects in Security and Trust.
[3] Jan Jürjens,et al. Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications , 2001, I3E.
[4] Mathieu Acher,et al. Towards Synthesis of Attack Trees for Supporting Computer-Aided Risk Analysis , 2014, SEFM Workshops.
[5] Flemming Nielson,et al. Automated Generation of Attack Trees , 2014, 2014 IEEE 27th Computer Security Foundations Symposium.
[6] Rocco De Nicola,et al. KLAIM: A Kernel Language for Agents Interaction and Mobility , 1998, IEEE Trans. Software Eng..
[7] Christian W. Probst,et al. An extensible analysable system model , 2008, Inf. Secur. Tech. Rep..
[8] Flemming Nielson,et al. Pareto Efficient Solutions of Attack-Defence Trees , 2015, POST.
[9] Florian Kammüller,et al. Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis , 2014, 2014 IEEE Security and Privacy Workshops.
[10] Jin B. Hong,et al. Scalable Attack Representation Model Using Logic Reduction Techniques , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[11] Pieter H. Hartel,et al. Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain , 2010, ARSPA-WITS.
[12] Barbara Kordy,et al. DAG-based attack and defense modeling: Don't miss the forest for the attack trees , 2013, Comput. Sci. Rev..