Method for Attack Tree Data Transformation and Import Into IT Risk Analysis Expert Systems

[1]  Bruce Schneier,et al.  Toward a secure system engineering methodolgy , 1998, NSPW '98.

[2]  Gregory S. Parnell,et al.  Mission Oriented Risk and Design Analysis of Critical Information Systems , 2005 .

[3]  Ravi Jhawar,et al.  Semi-automatically Augmenting Attack Trees Using an Annotated Attack Tree Library , 2018, STM.

[4]  Lucas Oliveira Batista,et al.  Fuzzy neural networks to create an expert system for detecting attacks by SQL Injection , 2018, The International Journal of Forensic Computer Science.

[5]  Jeannette M. Wing,et al.  Tools for Generating and Analyzing Attack Graphs , 2003, FMCO.

[6]  Arend Rensink,et al.  Effective Analysis of Attack Trees: A Model-Driven Approach , 2018, FASE.

[7]  Qihe Liu,et al.  Review of Artificial Intelligence Adversarial Attack and Defense Technologies , 2019, Applied Sciences.

[8]  Barbara Kordy,et al.  ADTool: Security Analysis with Attack-Defense Trees , 2013, QEST.

[9]  Barbara Kordy,et al.  DAG-based attack and defense modeling: Don't miss the forest for the attack trees , 2013, Comput. Sci. Rev..

[10]  David Valis,et al.  Attack tree-based evaluation of physical protection systems vulnerability , 2012, 2012 IEEE International Carnahan Conference on Security Technology (ICCST).

[11]  Jian Liu,et al.  Risk assessment of cyber attacks in ECPS based on attack tree and AHP , 2016, 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD).

[12]  Sophie Pinchinat,et al.  Is My Attack Tree Correct? , 2017, ESORICS.

[13]  Marivi Higuero,et al.  Continuous Quantitative Risk Management in Smart Grids Using Attack Defense Trees , 2020, Sensors.

[14]  Olga Gadyatskaya,et al.  Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees , 2016, GraMSec@CSF.

[15]  Yong-Hyun Kim,et al.  Attack Detection Application with Attack Tree for Mobile System using Log Analysis , 2019, Mob. Networks Appl..

[16]  Barbara Kordy,et al.  Attack Trees with Sequential Conjunction , 2015, SEC.

[17]  Jean-Marie Flaus,et al.  A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie - combining new version of attack tree with bowtie analysis , 2018, Comput. Secur..

[18]  D. Vitkus,et al.  Automated Expert System Knowledge Base Development Method for Information Security Risk Analysis , 2019, Int. J. Comput. Commun. Control.

[19]  Yi Xiao,et al.  Survivability analysis of SOA based on attack tree models , 2012, 2012 IEEE 14th International Conference on Communication Technology.

[20]  Tae-Sung Kim,et al.  Security risk assessment framework for smart car using the attack tree analysis , 2017, Journal of Ambient Intelligence and Humanized Computing.

[21]  Dmitry Podkuiko,et al.  Multi-vendor penetration testing in the advanced metering infrastructure , 2010, ACSAC '10.

[22]  Mingye Liu,et al.  Fault Tree Analysis for Safety/Security Verification in Aviation Software , 2013 .

[23]  Sanjay Goel,et al.  Producing and evaluating crowdsourced computer security attack trees , 2016, 2016 IEEE Symposium on Technologies for Homeland Security (HST).

[24]  Nikolaj Goranin,et al.  Dynamic Expert System-Based Geographically Adapted Malware Risk Evaluation Method , 2020, Int. J. Comput. Commun. Control.

[25]  Wenli Shang,et al.  Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees , 2019, Secur. Commun. Networks.