메뉴 건너뛰기




Volumn 6442 LNCS, Issue , 2010, Pages 245-256

Attack-defense trees and two-player binary zero-sum extensive form games are equivalent

Author keywords

[No Author keywords available]

Indexed keywords

EXPRESSIVE POWER; EXTENSIVE-FORM GAMES; INTERNAL STRUCTURE; SATISFIABILITY; SECURITY WEAKNESS; ZERO SUMS;

EID: 78650758022     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-17197-0_17     Document Type: Conference Paper
Times cited : (42)

References (10)
  • 2
    • 33745849657 scopus 로고    scopus 로고
    • Foundations of Attack Trees
    • Won, D.H., Kim, S. (eds.) ICISC 2005. Springer, Heidelberg
    • Mauw, S., Oostdijk, M.: Foundations of Attack Trees. In:Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186-198. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3935 , pp. 186-198
    • Mauw, S.1    Oostdijk, M.2
  • 3
    • 77954603264 scopus 로고    scopus 로고
    • Serial Model for Attack Tree Computations
    • Lee, D., Hong, S. (eds.) ICISC 2009. Springer, Heidelberg
    • Willemson, J., Jürgenson, A.: Serial Model for Attack Tree Computations. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 118-128. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5984 , pp. 118-128
    • Willemson, J.1    Jürgenson, A.2
  • 4
    • 76649111697 scopus 로고    scopus 로고
    • Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems
    • Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. Springer, Heidelberg
    • Rehák, M., Staab, E., Fusenig, V., Pěchouček, M., Grill, M., Stiborek, J., Bartoš, K., Engel, T.: Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 61-80. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5758 , pp. 61-80
    • Rehák, M.1    Staab, E.2    Fusenig, V.3    Pěchouček, M.4    Grill, M.5    Stiborek, J.6    Bartoš, K.7    Engel, T.8
  • 7
    • 35148896736 scopus 로고    scopus 로고
    • Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security
    • IEEE, Los Alamitos
    • Edge, K.S., Dalton II, G.C., Raines, R.A., Mills, R.F.: Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security. In: MILCOM, pp. 1-7. IEEE, Los Alamitos (2006)
    • (2006) MILCOM , pp. 1-7
    • Edge, K.S.1    Dalton II, G.C.2    Raines, R.A.3    Mills, R.F.4
  • 8
    • 38049144769 scopus 로고    scopus 로고
    • Strategic Games on Defense Trees
    • Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. Springer, Heidelberg
    • Bistarelli, S., Dall'Aglio, M., Peretti, P.: Strategic Games on Defense Trees. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol. 4691, pp. 1-15. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4691 , pp. 1-15
    • Bistarelli, S.1    Dall'Aglio, M.2    Peretti, P.3
  • 9
    • 78650724914 scopus 로고    scopus 로고
    • Foundations of Attack- Defense Trees
    • FAST. Springer, Heidelberg
    • Kordy, B., Mauw, S., Radomirović, S., Schweitzer, P.: Foundations of Attack- Defense Trees. In: FAST. LNCS. Springer, Heidelberg (2010), http://satoss.uni.lu/members/barbara/papers/adt.pdf
    • (2010) LNCS
    • Kordy, B.1    Mauw, S.2    Radomirović, S.3    Schweitzer, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.