Assessing Security of Cryptocurrencies with Attack-Defense Trees: Proof of Concept and Future Directions
暂无分享,去创建一个
Jan Kretínský | Julia Eisentraut | Stephan Holzer | Katharina Klioba | Lukas Pin | Alexander Wagner | Jan Křetínský | S. Holzer | Alexander Wagner | Julia Eisentraut | Katharina Klioba | Lü Pin
[1] Jan Křetínský,et al. Expected Cost Analysis of Attack-Defense Trees , 2019, QEST.
[2] Axel Legay,et al. Mitigating Security Risks Through Attack Strategies Exploration , 2018, ISoLA.
[3] Matteo Maffei,et al. Foundations and Tools for the Static Analysis of Ethereum Smart Contracts , 2018, CAV.
[4] Yan Wang,et al. A survey on security and privacy issues of blockchain technology , 2018, Math. Found. Comput..
[5] Barbara Kordy,et al. On Quantitative Analysis of Attack-Defense Trees with Repeated Labels , 2018, POST.
[6] Krishnendu Chatterjee,et al. Quantitative Analysis of Smart Contracts , 2018, ESOP.
[7] Mauro Conti,et al. A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.
[8] Sylvain Guilley,et al. Attack Tree Construction and Its Application to the Connected Vehicle , 2018, Cyber-Physical Systems Security.
[9] Jin B. Hong,et al. A survey on the usability and practical applications of Graphical Security Models , 2017, Comput. Sci. Rev..
[10] Barbara Kordy,et al. Evil Twins: Handling Repetitions in Attack-Defense Trees - A Survival Guide , 2017, GraMSec@CSF.
[11] Olga Gadyatskaya,et al. New Directions in Attack Tree Research: Catching up with Industrial Needs , 2017, GraMSec@CSF.
[12] Flemming Nielson,et al. Model Checking Exact Cost for Attack Scenarios , 2017, POST.
[13] Olga Gadyatskaya,et al. Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study , 2016, PoEM.
[14] Ali E. Abdallah,et al. Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis , 2016 .
[15] Jean-Michel Fourneau,et al. Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis , 2016, GraMSec@CSF.
[16] Edgar R. Weippl,et al. The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy , 2016, Financial Cryptography.
[17] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[18] Barbara Kordy,et al. Attack Trees with Sequential Conjunction , 2015, SEC.
[19] Mariëlle Stoelinga,et al. Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools , 2014, Comput. Sci. Rev..
[20] Reza Pulungan,et al. Time-Dependent Analysis of Attacks , 2014, POST.
[21] József Mezei,et al. Combining attack trees and fuzzy numbers in a multi-agent approach to fraud detection , 2011, Int. J. Electron. Bus..
[22] Barbara Kordy,et al. Foundations of Attack-Defense Trees , 2010, Formal Aspects in Security and Trust.
[23] Luigi Portinale,et al. Improving the analysis of dependable systems by mapping fault trees into Bayesian networks , 2001, Reliab. Eng. Syst. Saf..