Pages that link to "Item:Q473215"
From MaRDI portal
The following pages link to DAG-based attack and defense modeling: don't miss the forest for the attack trees (Q473215):
Displaying 14 items.
- A polytope-based approach to measure the impact of events against critical infrastructures (Q314790) (← links)
- Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker model (Q342516) (← links)
- The marriage between safety and cybersecurity: still practicing (Q832009) (← links)
- Attack trees vs. fault trees: two sides of the same coin from different currencies (Q832098) (← links)
- Probabilistic reasoning with graphical security models (Q1671722) (← links)
- Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs (Q1999634) (← links)
- Assessing security of cryptocurrencies with attack-defense trees: proof of concept and future directions (Q2119976) (← links)
- Is my attack tree correct? (Q2167713) (← links)
- A review of attack graph and attack tree visual syntax in cyber security (Q2197794) (← links)
- Fault tree analysis: a survey of the state-of-the-art in modeling, analysis and tools (Q2352775) (← links)
- Risk framework for bitcoin custody operation with the revault protocol (Q2670809) (← links)
- Quantitative Attack Tree Analysis via Priced Timed Automata (Q2945593) (← links)
- Parametric Analyses of Attack-fault Trees* (Q5025035) (← links)
- From attack graph analysis to attack function analysis (Q6058307) (← links)