Attribution of attack trees
From MaRDI portal
Recommendations
Cited in
(7)- Attack trees vs. fault trees: two sides of the same coin from different currencies
- OWA trees and their role in security modeling using attack trees
- DAG-based attack and defense modeling: don't miss the forest for the attack trees
- Attack-defense trees
- Attack chain detection
- Is my attack tree correct?
- Information Security and Cryptology - ICISC 2005
This page was built for publication: Attribution of attack trees
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1952526)