Upper Bounds for Adversaries’ Utility in Attack Trees
From MaRDI portal
Publication:4909433
DOI10.1007/978-3-642-34266-0_6zbMath1284.91086OpenAlexW126865974WikidataQ62048360 ScholiaQ62048360MaRDI QIDQ4909433
Publication date: 13 March 2013
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34266-0_6
Related Items
A review of attack graph and attack tree visual syntax in cyber security, DAG-based attack and defense modeling: don't miss the forest for the attack trees