swMATH22305MaRDI QIDQ34098FDOQ34098
Author name not available (Why is that?)
Official website: http://ieeexplore.ieee.org/document/5270307/
Cited In (16)
- Discrete game-theoretic analysis of defense in correlated cyber-physical systems
- Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs
- Non-zero-sum cooperative access control game model with user trust and permission risk
- Game theoretical security detection strategy for networked systems
- Dynamic games in cyber-physical security: an overview
- Attack-defense trees
- DAG-based attack and defense modeling: don't miss the forest for the attack trees
- ADTool
- AttackTree
- MulVAL
- ADEPTS
- SeaMonster
- SecurITree
- Hamsa
- Polygraph
- Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker model
This page was built for software: RRE