DAG-based attack and defense modeling: don't miss the forest for the attack trees
From MaRDI portal
Publication:473215
DOI10.1016/j.cosrev.2014.07.001zbMath1300.68026arXiv1303.7397MaRDI QIDQ473215
Barbara Kordy, Ludovic Piètre-Cambacédès, Patrick Schweitzer
Publication date: 24 November 2014
Published in: Computer Science Review (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1303.7397
Bayesian networks; attack and defense modeling; attack trees; graphical models for security; qualitative security assessment; quantitative security assessment; security measures
94A60: Cryptography
68P25: Data encryption (aspects in computer science)
68-02: Research exposition (monographs, survey articles) pertaining to computer science
Uses Software