Method for Attack Tree Data Transformation and Import Into IT Risk Analysis Expert Systems
暂无分享,去创建一个
[1] Bruce Schneier,et al. Toward a secure system engineering methodolgy , 1998, NSPW '98.
[2] Gregory S. Parnell,et al. Mission Oriented Risk and Design Analysis of Critical Information Systems , 2005 .
[3] Ravi Jhawar,et al. Semi-automatically Augmenting Attack Trees Using an Annotated Attack Tree Library , 2018, STM.
[4] Lucas Oliveira Batista,et al. Fuzzy neural networks to create an expert system for detecting attacks by SQL Injection , 2018, The International Journal of Forensic Computer Science.
[5] Jeannette M. Wing,et al. Tools for Generating and Analyzing Attack Graphs , 2003, FMCO.
[6] Arend Rensink,et al. Effective Analysis of Attack Trees: A Model-Driven Approach , 2018, FASE.
[7] Qihe Liu,et al. Review of Artificial Intelligence Adversarial Attack and Defense Technologies , 2019, Applied Sciences.
[8] Barbara Kordy,et al. ADTool: Security Analysis with Attack-Defense Trees , 2013, QEST.
[9] Barbara Kordy,et al. DAG-based attack and defense modeling: Don't miss the forest for the attack trees , 2013, Comput. Sci. Rev..
[10] David Valis,et al. Attack tree-based evaluation of physical protection systems vulnerability , 2012, 2012 IEEE International Carnahan Conference on Security Technology (ICCST).
[11] Jian Liu,et al. Risk assessment of cyber attacks in ECPS based on attack tree and AHP , 2016, 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD).
[12] Sophie Pinchinat,et al. Is My Attack Tree Correct? , 2017, ESORICS.
[13] Marivi Higuero,et al. Continuous Quantitative Risk Management in Smart Grids Using Attack Defense Trees , 2020, Sensors.
[14] Olga Gadyatskaya,et al. Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees , 2016, GraMSec@CSF.
[15] Yong-Hyun Kim,et al. Attack Detection Application with Attack Tree for Mobile System using Log Analysis , 2019, Mob. Networks Appl..
[16] Barbara Kordy,et al. Attack Trees with Sequential Conjunction , 2015, SEC.
[17] Jean-Marie Flaus,et al. A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie - combining new version of attack tree with bowtie analysis , 2018, Comput. Secur..
[18] D. Vitkus,et al. Automated Expert System Knowledge Base Development Method for Information Security Risk Analysis , 2019, Int. J. Comput. Commun. Control.
[19] Yi Xiao,et al. Survivability analysis of SOA based on attack tree models , 2012, 2012 IEEE 14th International Conference on Communication Technology.
[20] Tae-Sung Kim,et al. Security risk assessment framework for smart car using the attack tree analysis , 2017, Journal of Ambient Intelligence and Humanized Computing.
[21] Dmitry Podkuiko,et al. Multi-vendor penetration testing in the advanced metering infrastructure , 2010, ACSAC '10.
[22] Mingye Liu,et al. Fault Tree Analysis for Safety/Security Verification in Aviation Software , 2013 .
[23] Sanjay Goel,et al. Producing and evaluating crowdsourced computer security attack trees , 2016, 2016 IEEE Symposium on Technologies for Homeland Security (HST).
[24] Nikolaj Goranin,et al. Dynamic Expert System-Based Geographically Adapted Malware Risk Evaluation Method , 2020, Int. J. Comput. Commun. Control.
[25] Wenli Shang,et al. Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees , 2019, Secur. Commun. Networks.