DAG-based attack and defense modeling: Don't miss the forest for the attack trees

被引:0
|
作者
机构
[1] [1,Kordy, Barbara
[2] Piètre-Cambacédès, Ludovic
[3] Schweitzer, Patrick
来源
Kordy, Barbara (basia.kordy@gmail.com) | 1600年 / Elsevier Ireland Ltd卷 / 13-14期
关键词
Network security - Forestry - Directed graphs;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Cybersecurity for Critical Infrastructures: Attack and Defense Modeling
    Ten, Chee-Wooi
    Manimaran, Govindarasu
    Liu, Chen-Ching
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2010, 40 (04): : 853 - 865
  • [32] OWA trees and their role in security modeling using attack trees
    Yager, Ronald R.
    INFORMATION SCIENCES, 2006, 176 (20) : 2933 - 2959
  • [33] Don't miss the forest for the trees! Evidence for vertical differences in the response of plant diversity to disturbance in a tropical rain forest
    Decocq, Guillaume
    Beina, Denis
    Jamoneau, Aurelien
    Gourlet-Fleury, Sylvie
    Closset-Kopp, Deborah
    PERSPECTIVES IN PLANT ECOLOGY EVOLUTION AND SYSTEMATICS, 2014, 16 (06) : 279 - 287
  • [34] On Quantitative Analysis of Attack-Defense Trees with Repeated Labels
    Kordy, Barbara
    Widel, Wojciech
    PRINCIPLES OF SECURITY AND TRUST, POST 2018, 2018, 10804 : 325 - 346
  • [35] A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees
    Jhawar, Ravi
    Lounis, Karim
    Mauw, Sjouke
    SECURITY AND TRUST MANAGEMENT, STM 2016, 2016, 9871 : 138 - 153
  • [36] Modelling Attack-defense Trees Using Timed Automata
    Gadyatskaya, Olga
    Hansen, Rene Rydhof
    Larsen, Kim Guldstrand
    Legay, Axel
    Olesen, Mads Chr.
    Poulsen, Danny Bogsted
    FORMAL MODELING AND ANALYSIS OF TIMED SYSTEMS, FORMATS 2016, 2016, 9884 : 35 - 50
  • [37] Attack and defense based on buffer overflow
    Zhu, Wei
    Li, Wei
    2003, Fushun Petroleum Institute (23):
  • [38] Why we need systematic reviews and meta-analyses. Don't miss the forest for the trees
    Heesen, M.
    Halpern, S.
    INTERNATIONAL JOURNAL OF OBSTETRIC ANESTHESIA, 2021, 45 : 11 - 13
  • [39] Don't attack science agencies for political gain
    Url, Bernhard
    NATURE, 2018, 553 (7689) : 381 - 381
  • [40] System level Security modeling using Attack trees
    Khand, Parvaiz Ahmed
    2009 2ND INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL AND COMMUNICATION, 2009, : 115 - 120