Linked e-resources

Details

A Bottom-up Approach to Applying Graphical Models in Security Analysis
On the Soundness of Attack Trees
The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment
Differential Privacy Analysis of Data Processing Workflows
Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees
Enterprise Architecture-Based Risk and Security Modelling and Analysis
From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation
Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis
Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack
Confining Adversary Actions via Measurement. .

Browse Subjects

Show more subjects...

Statistics

from
to
Export