[1]
|
Barbara Kordy, Piotr Kordy, Sjouke Mauw, Patrick Schweitzer.
ADTool: Security Analysis with Attack-Defense Trees
To appear in The Proceedings of the 10th International Conference on Quantitative
Evaluation of Systems (QEST'13), volume 8054 of
Lecture Notes in Computer Science, pages 173-176, Springer, 2013.
[ extended version ]
|
[2]
|
Barbara Kordy, Sjouke Mauw, Patrick Schweitzer.
Quantitative Questions on Attack-Defense Trees.
The proceedings of
the 15th Annual International Conference on Information Security and Cryptology
(ICISC'2012), volume 7839 of Lecture Notes in Computer Science,
pages 49-64, Springer, 2013.
[ extended version ]
|
[3]
|
Barbara Kordy, Marc Pouly, and Patrick Schweitzer.
Computational Aspects of Attack-Defense Trees.
In Security & Intelligent Information Systems, volume 7053 of
LNCS, pages 103-116. Springer, 2011.
[ bib |
.pdf ]
|
[4]
|
Barbara Kordy, Sjouke Mauw, Saša Radomirović, and Patrick Schweitzer.
Foundations of attack-defense trees.
In Pierpaolo Degano, Sandro Etalle, and Joshua Guttman, editors,
Proceedings of the 7th international Workshop on Formal Aspects in Security
and Trust (FAST 2010), volume 6561 of LNCS, pages 80-95.
Springer-Verlag, 2011.
[ bib |
DOI |
.pdf ]
|
[5]
|
Barbara Kordy, Sjouke Mauw, Matthijs Melissen, and Patrick Schweitzer.
Attack-defense trees and two-player binary zero-sum extensive form
games are equivalent.
In Proceedings of the Conference on Decision and Game Theory for
Security (GameSec 2010), volume 6442 of LNCS, pages 245-256.
Springer, 2010.
[ bib |
http ]
|