This publication page was last updated in December 2013. For current publications, please continue to my private homepage.


[1] Brendan McKay, Pascal Schweitzer, and Patrick Schweitzer. Competition Numbers, Quasi-Line Graphs and Holes, 2013. To appear. [ bib ]
[2] Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, and Patrick Schweitzer. Attack-Defense Trees. Journal of Logic and Computation, 2013. To appear. [ bib | DOI | .pdf ]
[3] Alessandra Bagnato, Barbara Kordy, Per Håkon Meland, and Patrick Schweitzer. Attribute Decoration of Attack-Defense Trees. International Journal of Secure Software Engineering (IJSSE), 3(2):1-35, 2012. [ bib | DOI | .pdf ]
[4] Pascal Schweitzer and Patrick Schweitzer. Connecting face hitting sets in planar graphs. Inf. Process. Lett., 111(1):11-15, 2010. [ bib | DOI | .pdf ]
Keywords: Combinatorial problems, Planar graph, Face hitting set
[5] Frank C. Krysiak and Patrick Schweitzer. The optimal size of a permit market. Journal of Environmental Economics and Management, 60(2):133 - 143, 2010. [ bib | DOI ]
Keywords: Tradable permits, Uncertainty, Hot spot, Spatial model, Regulation, Non-uniformly mixed pollutant, Asymmetric information

This file was generated by bibtex2html 1.97.


[1] Barbara Kordy, Piotr Kordy, Sjouke Mauw, and Patrick Schweitzer. ADTool: Security Analysis with Attack-Defense Trees (Tool Demonstration Paper). In 10th International Conference on Quantitative Evaluation of SysTems, volume 8054 of LNCS, pages 173-176. Springer, 2013. [ bib | .pdf ]
[2] Tim Muller and Patrick Schweitzer. On Beta Models with Trust Chains. In 7th IFIP WG 11.11 International Conference on Trust Management, volume 401 of IFIP Advances in Information and Communication Technology, pages 49-65. Springer, 2013. [ bib | .pdf ]
[3] Barbara Kordy, Sjouke Mauw, and Patrick Schweitzer. Quantitative Questions on Attack-Defense Trees. In 15th Annual International Conference on Information Security and Cryptology, volume 7839 of LNCS, pages 49-64. Springer, 2012. [ bib | .pdf ]
[4] Tim Muller and Patrick Schweitzer. A Formal Derivation of Composite Trust. In 5th International Symposium on Foundations & Practice of Security, volume 7743 of LNCS, pages 132-148. Springer, 2012. [ bib | .pdf ]
[5] Barbara Kordy, Marc Pouly, and Patrick Schweitzer. Computational Aspects of Attack-Defense Trees. In 19th International Conference Security & Intelligent Information Systems, volume 7053 of LNCS, pages 103-116. Springer, 2011. [ bib | .pdf ]
[6] Barbara Kordy, Sjouke Mauw, Matthijs Melissen, and Patrick Schweitzer. Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent. In Tansu Alpcan, Levente Buttyán, and John S. Baras, editors, Decision and Game Theory for Security (GameSec 2010), volume 6442 of LNCS, pages 245-256. Springer, 2010. [ bib | .pdf ]
[7] Barbara Kordy, Sjouke Mauw, Saša Radomirović, and Patrick Schweitzer. Foundations of Attack-Defense Trees. In 7th International Workshop Formal Aspects of Security and Trust, volume 6561 of LNCS, pages 80-95. Springer, 2010. [ bib | .pdf ]

This file was generated by bibtex2html 1.97.


[1] Barbara Kordy, Ludovic Piètre-Cambacédès, and Patrick Schweitzer. DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees, 2013. Submitted. [ bib ]

This file was generated by bibtex2html 1.97.