-
2
-
-
33745849657
-
Foundations of Attack Trees
-
Won, D.H., Kim, S. (eds.) ICISC 2005. Springer, Heidelberg
-
Mauw, S., Oostdijk, M.: Foundations of Attack Trees. In:Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186-198. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3935
, pp. 186-198
-
-
Mauw, S.1
Oostdijk, M.2
-
3
-
-
77954603264
-
Serial Model for Attack Tree Computations
-
Lee, D., Hong, S. (eds.) ICISC 2009. Springer, Heidelberg
-
Willemson, J., Jürgenson, A.: Serial Model for Attack Tree Computations. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 118-128. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5984
, pp. 118-128
-
-
Willemson, J.1
Jürgenson, A.2
-
4
-
-
76649111697
-
Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems
-
Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. Springer, Heidelberg
-
Rehák, M., Staab, E., Fusenig, V., Pěchouček, M., Grill, M., Stiborek, J., Bartoš, K., Engel, T.: Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 61-80. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5758
, pp. 61-80
-
-
Rehák, M.1
Staab, E.2
Fusenig, V.3
Pěchouček, M.4
Grill, M.5
Stiborek, J.6
Bartoš, K.7
Engel, T.8
-
7
-
-
35148896736
-
Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security
-
IEEE, Los Alamitos
-
Edge, K.S., Dalton II, G.C., Raines, R.A., Mills, R.F.: Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security. In: MILCOM, pp. 1-7. IEEE, Los Alamitos (2006)
-
(2006)
MILCOM
, pp. 1-7
-
-
Edge, K.S.1
Dalton II, G.C.2
Raines, R.A.3
Mills, R.F.4
-
8
-
-
38049144769
-
Strategic Games on Defense Trees
-
Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. Springer, Heidelberg
-
Bistarelli, S., Dall'Aglio, M., Peretti, P.: Strategic Games on Defense Trees. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol. 4691, pp. 1-15. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4691
, pp. 1-15
-
-
Bistarelli, S.1
Dall'Aglio, M.2
Peretti, P.3
-
9
-
-
78650724914
-
Foundations of Attack- Defense Trees
-
FAST. Springer, Heidelberg
-
Kordy, B., Mauw, S., Radomirović, S., Schweitzer, P.: Foundations of Attack- Defense Trees. In: FAST. LNCS. Springer, Heidelberg (2010), http://satoss.uni.lu/members/barbara/papers/adt.pdf
-
(2010)
LNCS
-
-
Kordy, B.1
Mauw, S.2
Radomirović, S.3
Schweitzer, P.4
-
10
-
-
78650750910
-
-
http://arxiv.org/abs/1006.2732
-
Kordy, B., Mauw, S., Melissen, M., Schweitzer, P.: Attack-defense trees and two-player binary zero-sum extensive form games are equivalent - technical report with proofs, http://arxiv.org/abs/1006.2732
-
Attack-defense Trees and Two-player Binary Zero-sum Extensive Form Games Are Equivalent - Technical Report with Proofs
-
-
Kordy, B.1
Mauw, S.2
Melissen, M.3
Schweitzer, P.4
|