![]() Melissen, Matthijs ![]() Doctoral thesis (2013) Detailed reference viewed: 72 (11 UL)![]() Jamroga, Wojciech ![]() ![]() in PRIMA 2013: Principles and Practice of Multi-Agent Systems. Proceedings (2013) Detailed reference viewed: 60 (6 UL)![]() Jamroga, Wojciech ![]() ![]() ![]() in Proceedings of STM 2011 (2012) Detailed reference viewed: 114 (2 UL)![]() Jamroga, Wojciech ![]() ![]() in Progress in Artificial Intelligence, Proceedings of the 15th Portuguese Conference on Artificial Intelligence (2011) Detailed reference viewed: 104 (2 UL)![]() Melissen, Matthijs ![]() in Proceedings of Formal Grammar 2009 (2011) Detailed reference viewed: 104 (1 UL)![]() Kordy, Barbara ![]() ![]() ![]() in Proceedings of GameSec 2010 (2010) Attack-defense trees are used to describe security weaknesses of a system and possible countermeasures. In this paper, the connection between attack-defense trees and game theory is made explicit. We show ... [more ▼] Attack-defense trees are used to describe security weaknesses of a system and possible countermeasures. In this paper, the connection between attack-defense trees and game theory is made explicit. We show that attack-defense trees and binary zero-sum two-player extensive form game have equivalent expressive power when considering satisfiability, in the sense that they can be converted into each other while preserving their outcome and their internal structure. [less ▲] Detailed reference viewed: 160 (8 UL) |
||