Linked e-resources

Details

Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks
Library-based Attack Tree Synthesis
Asset-Centric Analysis and Visualisation of Attack Trees
An attack simulation language for the IT domain
Representing decision-makers in SGAM-H: The Smart Grid Architecture Model Extended with the Human Layer
Breaking the cyber kill chain by modelling resource costs
GroDDViewer: Dynamic Dual View of Android Malware
Attack-Defence Frameworks: Argumentation-based Semantics for Attack-Defence Trees
A diagrammatic approach to information flow in encrypted communication
Contextualisation of Data Flow Diagrams for security analysis.

Browse Subjects

Show more subjects...

Statistics

from
to
Export