Attribution of attack trees
暂无分享,去创建一个
[1] Ronald R. Yager. OWA trees and their role in security modeling using attack trees , 2006, Inf. Sci..
[2] Jan Willemson,et al. Serial Model for Attack Tree Computations , 2009, ICISC.
[3] Indrajit Ray,et al. Investigating Computer Attacks Using Attack Trees , 2007, IFIP Int. Conf. Digital Forensics.
[4] Zhu Ning,et al. Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance Test , 2008, 2008 International Conference on Computer Science and Software Engineering.
[5] Igor Nai Fovino,et al. Integrating cyber attacks within fault trees , 2009, Reliab. Eng. Syst. Saf..
[6] Bülent Yener,et al. Modeling and detection of complex attacks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[7] Jan Willemson,et al. Computing Exact Outcomes of Multi-parameter Attack Trees , 2008, OTM Conferences.
[8] Barbara Kordy,et al. Foundations of Attack-Defense Trees , 2010, Formal Aspects in Security and Trust.
[9] G. Manimaran,et al. Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[10] Stefano Bistarelli,et al. Defense trees for economic evaluation of security investments , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[11] Jan Willemson,et al. Rational Choice of Security Measures Via Multi-parameter Attack Trees , 2006, CRITIS.
[12] Ana R. Cavalli,et al. Security Protocol Testing Using Attack Trees , 2009, 2009 International Conference on Computational Science and Engineering.
[13] Jan Willemson,et al. Processing Multi-parameter Attacktrees with Estimated Parameter Values , 2007, IWSEC.
[14] T. Tidwell,et al. Modeling Internet Attacks , 2022 .
[15] Richard F. Paige,et al. Fault trees for security system design and analysis , 2003, Comput. Secur..
[16] Indrajit Ray,et al. Optimal security hardening using multi-objective optimization on attack tree models of networks , 2007, CCS '07.
[17] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.