DAG-based attack and defense modeling: Don't miss the forest for the attack trees

被引:0
|
作者
机构
[1] [1,Kordy, Barbara
[2] Piètre-Cambacédès, Ludovic
[3] Schweitzer, Patrick
来源
Kordy, Barbara (basia.kordy@gmail.com) | 1600年 / Elsevier Ireland Ltd卷 / 13-14期
关键词
Network security - Forestry - Directed graphs;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] PREDICTING PATHOLOGIC STAGE, NOMOGRAMS, AND CLINICAL JUDGMENT: DON'T MISS THE FOREST FOR THE TREES!
    Roach, Mack, III
    INTERNATIONAL JOURNAL OF RADIATION ONCOLOGY BIOLOGY PHYSICS, 2009, 73 (02): : 325 - 326
  • [22] Modeling Attack-Defense Trees' Countermeasures Using Continuous Time Markov Chains
    Lounis, Karim
    Ouchani, Samir
    SOFTWARE ENGINEERING AND FORMAL METHODS, SEFM 2020, 2021, 12524 : 30 - 42
  • [23] Expected Cost Analysis of Attack-Defense Trees
    Eisentraut, Julia
    Kretinsky, Jan
    QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 203 - 221
  • [24] ADTLang: a programming language approach to attack defense trees
    René Rydhof Hansen
    Kim Guldstrand Larsen
    Axel Legay
    Peter Gjøl Jensen
    Danny Bøgsted Poulsen
    International Journal on Software Tools for Technology Transfer, 2021, 23 : 89 - 104
  • [25] ADTLang: a programming language approach to attack defense trees
    Hansen, Rene Rydhof
    Larsen, Kim Guldstrand
    Legay, Axel
    Jensen, Peter Gjol
    Poulsen, Danny Bogsted
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2021, 23 (01) : 89 - 104
  • [26] Stochastic-based Semantics Of Attack-Defense Trees For Security Assessment
    Lounis, Karim
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2018, 337 : 135 - 154
  • [27] Threat risk analysis for cloud security based on Attack-Defense Trees
    Wang, Ping
    Lin, Hui-Tang
    Wang, Tzu Chia
    Lin, Wen-Hui
    Kuo, Pu-Tsun
    International Journal of Advancements in Computing Technology, 2012, 4 (17) : 607 - 617
  • [28] Optimizing Pharmacotherapy Management of Chronic Obstructive Pulmonary Disease: Don't Miss the Forest for the Trees
    Bourbeau, Jean
    Bhutani, Mohit
    Hernandez, Paul
    Penz, Erika
    Marciniuk, Darcy D.
    AMERICAN JOURNAL OF RESPIRATORY AND CRITICAL CARE MEDICINE, 2024, 210 (05) : 545 - 547
  • [29] An Approach to Attack Modeling for the IoT: Creating Attack Trees from System Descriptions
    Sequeiros, Joao B. F.
    Chimuco, Francisco Tchissaquila
    Simoes, Tiago M. C.
    Freire, Mario M.
    Inacio, Pedro R. M.
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, AINA 2024, 2024, 200 : 424 - 436
  • [30] Adversarial organization modeling for network attack/defense
    Wu, Ji
    Ye, Chaoqun
    Jin, Shiyao
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 90 - 99