Attack trees vs. fault trees: two sides of the same coin from different currencies
From MaRDI portal
Publication:832098
DOI10.1007/978-3-030-85172-9_24zbMATH Open1491.68035OpenAlexW3193789558MaRDI QIDQ832098FDOQ832098
Authors: C. Budde, Christina Kolb, Mariëlle I. A. Stoelinga
Publication date: 24 March 2022
Full work available at URL: https://research.utwente.nl/en/publications/attack-trees-vs-fault-trees(8457608b-42d7-47b4-afef-b1c23de6dba3).html
Recommendations
Reliability, testing and fault tolerance of networks and computer systems (68M15) Computer security (68M25)
Cites Work
- Title not available (Why is that?)
- DAG-based attack and defense modeling: don't miss the forest for the attack trees
- Fault Tree Analysis, Methods, and Applications ߝ A Review
- Information Security and Cryptology - ICISC 2005
- Fault tree analysis: a survey of the state-of-the-art in modeling, analysis and tools
- Quantitative attack tree analysis via priced timed automata
Cited In (4)
Uses Software
This page was built for publication: Attack trees vs. fault trees: two sides of the same coin from different currencies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q832098)