Attack-defense trees
From MaRDI portal
Publication:5406123
DOI10.1093/logcom/exs029zbMath1311.68062OpenAlexW2142527556MaRDI QIDQ5406123
Patrick Schweitzer, Sjouke Mauw, Barbara Kordy, Saša Radomirović
Publication date: 1 April 2014
Published in: Journal of Logic and Computation (Search for Journal in Brave)
Full work available at URL: https://semanticscholar.org/paper/b5c6cc3b4c66a4666980209a69536022c3dd5773
semanticsattributesattack treescountermeasurescomplete set of axiomsattack-defense treessecurity assessment
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (8)
The marriage between safety and cybersecurity: still practicing ⋮ A polytope-based approach to measure the impact of events against critical infrastructures ⋮ Is my attack tree correct? ⋮ Probabilistic reasoning with graphical security models ⋮ Risk framework for bitcoin custody operation with the revault protocol ⋮ Unnamed Item ⋮ DAG-based attack and defense modeling: don't miss the forest for the attack trees ⋮ Parametric Analyses of Attack-fault Trees*
Uses Software
This page was built for publication: Attack-defense trees