Attack-Defense Trees for Abusing Optical Power Meters: A Case Study and the OSEAD Tool Experience Report
暂无分享,去创建一个
[1] Barbara Kordy,et al. On Quantitative Analysis of Attack-Defense Trees with Repeated Labels , 2018, POST.
[2] Arend Rensink,et al. Effective Analysis of Attack Trees: A Model-Driven Approach , 2018, FASE.
[3] Barbara Kordy,et al. Attack-defense trees , 2014, J. Log. Comput..
[4] Barbara Kordy,et al. Efficient Attack-Defense Tree Analysis using Pareto Attribute Domains , 2019, 2019 IEEE 32nd Computer Security Foundations Symposium (CSF).
[5] Barbara Kordy,et al. Probabilistic reasoning with graphical security models , 2016, Inf. Sci..
[6] Reza Pulungan,et al. Time-Dependent Analysis of Attacks , 2014, POST.
[7] Kim G. Larsen,et al. Modelling Attack-defense Trees Using Timed Automata , 2016, FORMATS.
[8] Olga Gadyatskaya,et al. Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study , 2016, PoEM.
[9] Olga Gadyatskaya,et al. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0 , 2016, QEST.
[10] Mariëlle Stoelinga,et al. DFTCalc: a tool for efficient fault tree analysis (extended version) , 2013 .
[11] Sophie Pinchinat,et al. Beyond 2014 , 2019, ACM Comput. Surv..
[12] Flemming Nielson,et al. Pareto Efficient Solutions of Attack-Defence Trees , 2015, POST.
[13] Barbara Kordy,et al. How Well Can I Secure My System? , 2017, IFM.
[14] Ketil Stølen,et al. Model-Driven Risk Analysis - The CORAS Approach , 2010 .
[15] Barbara Kordy,et al. Evil Twins: Handling Repetitions in Attack-Defense Trees - A Survival Guide , 2017, GraMSec@CSF.
[16] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[17] R.F. Mills,et al. Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[18] Barbara Kordy,et al. Quantitative Questions on Attack-Defense Trees , 2012, ICISC.
[19] Alexander Pretschner,et al. Enhancement of Automotive Penetration Testing with Threat Analyses Results , 2018 .