共 50 条
- [1] Cyber-Attack Risks Analysis Based on Attack-Defense Trees [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 667 - 678
- [4] Foundations of Attack-Defense Trees [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 80 - +
- [5] Expected Cost Analysis of Attack-Defense Trees [J]. QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 203 - 221
- [6] Cyber Attack-Defense Game Strategy Solving Based on Reinforcement Learning and Self-play Cyber Attack-Defense Game Solver [J]. PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 135 - 141
- [7] On Quantitative Analysis of Attack-Defense Trees with Repeated Labels [J]. PRINCIPLES OF SECURITY AND TRUST, POST 2018, 2018, 10804 : 325 - 346
- [8] A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees [J]. SECURITY AND TRUST MANAGEMENT, STM 2016, 2016, 9871 : 138 - 153
- [9] Computational Aspects of Attack-Defense Trees [J]. SECURITY AND INTELLIGENT INFORMATION SYSTEMS, 2012, 7053 : 103 - +
- [10] Assessing the Understandability and Acceptance of Attack-Defense Trees for Modelling Security Requirements [J]. REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2024, 2024, 14588 : 39 - 56