Publications

Journal Publications

Conference Proceedings

[1] Barbara Kordy, Piotr Kordy, Sjouke Mauw, Patrick Schweitzer. ADTool: Security Analysis with Attack-Defense Trees To appear in The Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST'13), volume 8054 of Lecture Notes in Computer Science, pages 173-176, Springer, 2013. [ extended version ]
[2] Barbara Kordy, Sjouke Mauw, Patrick Schweitzer. Quantitative Questions on Attack-Defense Trees. The proceedings of the 15th Annual International Conference on Information Security and Cryptology (ICISC'2012), volume 7839 of Lecture Notes in Computer Science, pages 49-64, Springer, 2013. [ extended version ]
[3] Barbara Kordy, Marc Pouly, and Patrick Schweitzer. Computational Aspects of Attack-Defense Trees. In Security & Intelligent Information Systems, volume 7053 of LNCS, pages 103-116. Springer, 2011. [ bib | .pdf ]
[4] Barbara Kordy, Sjouke Mauw, Saša Radomirović, and Patrick Schweitzer. Foundations of attack-defense trees. In Pierpaolo Degano, Sandro Etalle, and Joshua Guttman, editors, Proceedings of the 7th international Workshop on Formal Aspects in Security and Trust (FAST 2010), volume 6561 of LNCS, pages 80-95. Springer-Verlag, 2011. [ bib | DOI | .pdf ]
[5] Barbara Kordy, Sjouke Mauw, Matthijs Melissen, and Patrick Schweitzer. Attack-defense trees and two-player binary zero-sum extensive form games are equivalent. In Proceedings of the Conference on Decision and Game Theory for Security (GameSec 2010), volume 6442 of LNCS, pages 245-256. Springer, 2010. [ bib | http ]

Presentations, Invited Talks and Posters