Publications

Export 8 results:
Author Title Type [ Year(Desc)]
Filters: Author is B. Kordy  [Clear All Filters]
2013
Kordy B., Kordy P., Mauw S., Schweitzer P..  2013.  ADTool: Security Analysis with Attack-Defense Trees. 10th International Conference on Quantitative Evaluation of Systems (QEST), Buenos Aires, Argentina. 8054:173–176.
2015
Jhawar R., Kordy B., Mauw S., Radomirović S., Trujillo-Rasua R..  2015.  Attack Trees with Sequential Conjunction. International Conference on ICT Systems Security and Privacy Protection (IFIPSEC), Hamburg, Germany.
Ivanova M.G, Probst C.W, Hansen R.R, Kammueller F..  2015.  Transforming Graphical System Models To Graphical Attack Models. The Second International Workshop on Graphical Models for Security (GraMSec 2015), Verona, Italy. :1–15.
2016
Probst C.W, Willemson J., Pieters W..  2016.  The Attack Navigator (Invited). Graphical Models for Security - Revised Selected Papers. 9390:1–17.
Jonkers H., Quartel D.AC.  2016.  Enterprise Architecture-Based Risk and Security Modelling and Analysis. Third International Workshop, GraMSec 2016, Lisbon, Portugal. 9987:94–101.
Kordy B., Pouly M., Schweitzer P..  2016.  Probabilistic reasoning with graphical security models. Information sciences. 342:111–131.