메뉴 건너뛰기




Volumn 3935 LNCS, Issue , 2006, Pages 186-198

Foundations of attack trees

Author keywords

Attack trees; Semantics; Threat analysis

Indexed keywords

ATTACK TREES; DENOTATIONAL SEMANTICS,; THREAT ANALYSIS;

EID: 33745849657     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11734727_17     Document Type: Conference Paper
Times cited : (402)

References (16)
  • 2
    • 84858921629 scopus 로고    scopus 로고
    • Risk techniques, fault trees
    • ARES corporation. Risk techniques, fault trees. Technical report. Available from http://www.arescorporation.com/.
    • Technical Report
  • 3
    • 0032190827 scopus 로고    scopus 로고
    • An approach to vulnerability analysis of complex industrial systems
    • Stefan Einarsson and Marvin Rausand. An approach to vulnerability analysis of complex industrial systems. Risk Analysis, 18(5):535-545, 1998.
    • (1998) Risk Analysis , vol.18 , Issue.5 , pp. 535-545
    • Einarsson, S.1    Rausand, M.2
  • 4
    • 0019608720 scopus 로고
    • Formal models for computer security
    • September
    • Carl E. Landwehr. Formal models for computer security. Computing Surveys, 13(3):247-277, September 1981.
    • (1981) Computing Surveys , vol.13 , Issue.3 , pp. 247-277
    • Landwehr, C.E.1
  • 5
    • 33745855535 scopus 로고    scopus 로고
    • A quick tour of attack tree based risk analysis using SecurITree
    • Amaneza Technologies Limited. A quick tour of attack tree based risk analysis using SecurITree. Technical report, 2002.
    • (2002) Technical Report
  • 7
    • 84961720022 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • Catherine Meadows. Open issues in formal methods for cryptographic protocol analysis. In DARPA Information Survivability Conference & Exposition, volume 1, pages 237-250, 2000.
    • (2000) DARPA Information Survivability Conference & Exposition , vol.1 , pp. 237-250
    • Meadows, C.1
  • 9
    • 84988504967 scopus 로고    scopus 로고
    • A graph-based system for network-vulnerability analysis
    • Cynthia Phillips and Laura Painton Swiler. A graph-based system for network-vulnerability analysis. In Proc. New Security Paradigms Workshop, pages 71-79, 1998.
    • (1998) Proc. New Security Paradigms Workshop , pp. 71-79
    • Phillips, C.1    Swiler, L.P.2
  • 10
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • December
    • Bruce Schneier. Attack trees: Modeling security threats. Dr. Dobb's journal, December 1999.
    • (1999) Dr. Dobb's Journal
    • Schneier, B.1
  • 12
    • 0036038515 scopus 로고    scopus 로고
    • Collaborative attack modeling
    • ACM
    • Jan Stefan and Markus Schumacher. Collaborative attack modeling. In Proc. SAC 2002, pages 253-259. ACM, 2002.
    • (2002) Proc. SAC 2002 , pp. 253-259
    • Stefan, J.1    Schumacher, M.2
  • 16
    • 0004269078 scopus 로고
    • Technical Report NUREG-0492, U.S. Nuclear Regulatory Commission, January
    • W.E. Vesely et al. Fault tree handbook. Technical Report NUREG-0492, U.S. Nuclear Regulatory Commission, January 1981.
    • (1981) Fault Tree Handbook
    • Vesely, W.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.