![]() Li, Qian ![]() ![]() ![]() in Proc. 6th International Symposium on Theoretical Aspects of Software Engineering (2012) Detailed reference viewed: 143 (3 UL)![]() Chen, Xihui ![]() ![]() ![]() in Proc. 7th International Conference on Availability, Reliability and Security (2012) Detailed reference viewed: 165 (2 UL)![]() Sun, Yanjie ![]() ![]() ![]() in Proc. 6th International Workshop on Security and Trust Management (2011) Detailed reference viewed: 135 (1 UL)![]() van Deursen, Ton ![]() ![]() ![]() in Abstract book of 20th USENIX Security Symposium (2011) Detailed reference viewed: 39 (1 UL)![]() Lenzini, Gabriele ![]() ![]() ![]() in Proc. 19th International Workshop on Security Protocols (2011) Detailed reference viewed: 178 (7 UL)![]() Mauw, Sjouke ![]() in Proceedings of 19th Security Protocols Workshop (2011), 7114 Detailed reference viewed: 102 (1 UL)![]() Yuan, Qixia ![]() ![]() ![]() in Proceedings of the 3rd Workshop on Computational Models for Cell Processes (2011), EPTCS 67 Detailed reference viewed: 165 (13 UL)![]() Mauw, Sjouke ![]() ![]() ![]() in Proc. 18th Security Protocols Workshop (2010) Detailed reference viewed: 267 (8 UL)![]() ; Mauw, Sjouke ![]() in Rosenberg, G. (Ed.) Handbook of Financial Cryptography and Security (2010) Detailed reference viewed: 46 (1 UL)![]() Zhang, Ying ![]() ![]() ![]() in Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (2010) Detailed reference viewed: 128 (3 UL)![]() Kordy, Barbara ![]() ![]() ![]() in Proceedings of GameSec 2010 (2010) Attack-defense trees are used to describe security weaknesses of a system and possible countermeasures. In this paper, the connection between attack-defense trees and game theory is made explicit. We show ... [more ▼] Attack-defense trees are used to describe security weaknesses of a system and possible countermeasures. In this paper, the connection between attack-defense trees and game theory is made explicit. We show that attack-defense trees and binary zero-sum two-player extensive form game have equivalent expressive power when considering satisfiability, in the sense that they can be converted into each other while preserving their outcome and their internal structure. [less ▲] Detailed reference viewed: 158 (8 UL)![]() Kordy, Barbara ![]() ![]() ![]() in Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (2010) We introduce and give formal definitions of attack–defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic ... [more ▼] We introduce and give formal definitions of attack–defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic in the sense that it supports different semantical approaches. We present several semantics for attack–defense trees along with usage scenarios, and we show how to evaluate attributes. [less ▲] Detailed reference viewed: 121 (3 UL)![]() Alcalde, Baptiste ![]() ![]() in Proc. 7th Workshop on Formal Aspects in Security and Trust (2009) Detailed reference viewed: 92 (0 UL)![]() Alcalde, Baptiste ![]() ![]() in Proc. 7th Australasian Information Security Conference - AISC'09 (2009) Detailed reference viewed: 40 (0 UL)![]() Jonker, Hugo ![]() ![]() ![]() in Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (2009) Detailed reference viewed: 115 (2 UL)![]() Jonker, Hugo ![]() ![]() ![]() in Journal of Algorithms in Cognition, Informatics and Logic (2009) Detailed reference viewed: 117 (7 UL)![]() Jonker, Hugo ![]() ![]() in Handbook of Research on Secure Multimedia Distribution (2009) Detailed reference viewed: 89 (0 UL)![]() Alcalde, Baptiste ![]() ![]() in Seventh Australasian Information Security Conference (AISC 2009) (2009) Detailed reference viewed: 98 (0 UL)![]() van Deursen, Ton ![]() ![]() ![]() in Proc. 14th European Symposium On Research In Computer Security (ESORICS'09) (2009) Detailed reference viewed: 99 (0 UL)![]() Mauw, Sjouke ![]() ![]() in Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09) (2009) Detailed reference viewed: 97 (0 UL) |
||