Attack trees vs. fault trees: two sides of the same coin from different currencies
From MaRDI portal
(Redirected from Publication:832098)
Recommendations
Cites work
- scientific article; zbMATH DE number 3591262 (Why is no real title available?)
- DAG-based attack and defense modeling: don't miss the forest for the attack trees
- Fault Tree Analysis, Methods, and Applications ߝ A Review
- Fault tree analysis: a survey of the state-of-the-art in modeling, analysis and tools
- Information Security and Cryptology - ICISC 2005
- Quantitative attack tree analysis via priced timed automata
Cited in
(4)
This page was built for publication: Attack trees vs. fault trees: two sides of the same coin from different currencies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q832098)