Attack Trees (C08/IS/26)

@inproceedings{KoPoSc,
  author = {Barbara Kordy and Marc Pouly and Patrick Schweitzer},
  title = {{Computational Aspects of Attack--Defense Trees}},
  booktitle = {Security \& Intelligent Information Systems },
  publisher = {Springer},
  pages = {103--116},
  year = {2011},
  volume = {7053},
  series = {LNCS},
}
@inproceedings{KMRS10,
  author = {Barbara Kordy and Sjouke Mauw and Sa\v{s}a Radomirovi\'c and Patrick Schweitzer},
  booktitle = {Proceedings of the 7th international Workshop on Formal Aspects in Security and Trust  (FAST 2010)},
  title = {Foundations of Attack--Defense Trees},
  year = {2011},
  editor = {Pierpaolo Degano and Sandro Etalle and Joshua Guttman},
  series = {LNCS},
  volume = {6561},
  pages = {80--95},
  publisher = {Springer-Verlag},
  location = {Pisa, Italy},
  doi = {10.1007/978-3-642-19751-2_6},
}
@inproceedings{KMMS10,
  author = {Barbara Kordy and Sjouke Mauw and Matthijs Melissen and Patrick Schweitzer},
  booktitle = {Proceedings of the Conference on Decision and Game Theory for Security (GameSec 2010)},
  title = {Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent},
  publisher = {Springer},
  series = {{LNCS}},
  year = {2010},
  pages = {245--256},
  volume = {6442},
}