Linked e-resources
Details
Table of Contents
Graphical modeling of Security Arguments: Current State and Future Directions
Evil Twins: Handling Repetitions in Attack
Defense Trees
A Survival Guide
Visualizing Cyber Security Risks with Bow-Tie Diagrams
CSIRA: A method for analysing the risk of cybersecurity incidents
Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata
Probabilistic Modeling of Insider Threat Detection Systems
Security Modeling for Embedded System Design
Circle of Health Based Access Control for Personal Health Information Systems
New Directions in Attack Tree Research: Catching up with Industrial Needs
Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring
the WISER Approach.
Evil Twins: Handling Repetitions in Attack
Defense Trees
A Survival Guide
Visualizing Cyber Security Risks with Bow-Tie Diagrams
CSIRA: A method for analysing the risk of cybersecurity incidents
Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata
Probabilistic Modeling of Insider Threat Detection Systems
Security Modeling for Embedded System Design
Circle of Health Based Access Control for Personal Health Information Systems
New Directions in Attack Tree Research: Catching up with Industrial Needs
Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring
the WISER Approach.