Publications

Export 8 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is attack trees  [Clear All Filters]
2015
Pieters W., Davarynejad M..  2015.  Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers. 9th International Workshop on Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance (DPM), Wroclaw, Poland. 8872:201–215.
Kordy B.K, Piètre-Cambacédès L., Schweitzer P..  2015.  DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees. Computer Science Review. 13-14:1–38.
David N., David A., Hansen R.R, Larsen K.G, Legay A., Olesen M.C, Probst C.W.  2015.  Modelling Social-Technical Attacks with Timed Automata. Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Denver, Colorado, US. :21–28.
Kumar R., Ruijters E.JJ, Stoelinga M.IA.  2015.  Quantitative Attack Tree Analysis via Priced Timed Automata. Proceedings of the 13th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2015, Madrid, Spain. 9268:156–171.
Kumar R., Guck D., Stoelinga M.IA.  2015.  Time dependent analysis with dynamic counter measure trees. Proceedings of the 13th Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2015), London, England.
Nidd M., Ivanova M.G, Probst C.W, Tanner A..  2015.  Tool-based Risk Assessment of Cloud Infrastructures as Socio-Technical Systems. The Cloud Security Ecosystem. :495–517.
2014
Kordy B.K, Piètre-Cambacédès L., Schweitzer P..  2014.  DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees. Computer Science Review. 13-14:1–38.
Arnold F., Hermanns H., Pulungan R., Stoelinga M.IA.  2014.  Time-dependent analysis of attacks. Proceedings of the Third International Conference on Principles and Security of Trust, POST 2014, Grenoble, France. 8414:285–305.