Profil

KORDY Barbara

Main Referenced Co-authors
SCHWEITZER, Patrick  (9)
MAUW, Sjouke  (7)
RADOMIROVIC, Sasa  (3)
POULY, Marc  (2)
Bagnato, Alessandra (1)
Main Referenced Keywords
Attack-Defense Trees (7); Attack Trees (6); Graphical Security Modeling (4); Attributes (3); Case Study (1);
Main Referenced Disciplines
Computer science (12)

Publications (total 12)

The most downloaded
1 downloads
Kordy, B., Mauw, S., Radomirovic, S., & Schweitzer, P. (2012). Attack-Defense Trees. Journal of Logic and Computation. doi:10.1093/logcom/exs029 https://hdl.handle.net/10993/11472

The most cited

167 citations (Scopus®)

Kordy, B., Mauw, S., Radomirovic, S., & Schweitzer, P. (2010). Foundations of Attack-Defense Trees. In Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (pp. 80-95). Springer. https://hdl.handle.net/10993/11461

Kordy, B., Schweitzer, P., & Pouly, M. (2014). A Probabilistic Framework for Security Scenarios with Dependent Actions. In The 11th International Conference on Integrated Formal Methods (iFM'14), Bertinoro, Italy.
Peer reviewed

Kordy, B., Mauw, S., & Pieters, P. (2014). Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014. In First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014. Springer. doi:10.4204/EPTCS.148
Peer reviewed

Kordy, B., Kordy, P., Mauw, S., & Schweitzer, P. (2013). ADTool: Security Analysis with Attack-Defense Trees (Tool Demonstration Paper). In 10th International Conference on Quantitative Evaluation of SysTems (pp. 173-176). Springer.
Peer reviewed

Kordy, B., Mauw, S., Radomirovic, S., & Schweitzer, P. (2012). Attack-Defense Trees. Journal of Logic and Computation. doi:10.1093/logcom/exs029
Peer reviewed

Kordy, B., & Radomirovic, S. (2012). Constructing Optimistic Multi-party Contract Signing Protocols. In Computer Security Foundations (CSF 2012) (pp. 215-229). IEEE.
Peer reviewed

Bagnato, A., Kordy, B., Meland, P. H., & Schweitzer, P. (2012). Attribute Decoration of Attack-Defense Trees. International Journal of Secure Software Engineering, 3 (2), 1-35. doi:10.4018/jsse.2012040101
Peer reviewed

Kordy, B., Mauw, S., & Schweitzer, P. (2012). Quantitative Questions on Attack-Defense Trees. In Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers (pp. 49-64). Springer.
Peer reviewed

Kordy, B., Mauw, S., & Schweitzer, P. (2012). Quantitative Questions on Attack-Defense Trees.

Kordy, B., Pouly, M., & Schweitzer, P. (2011). Computational Aspects of Attack-Defense Trees. In Security and Intelligent Information Systems - International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers (pp. 103-116). Springer.
Peer reviewed

Kordy, B., Mauw, S., Melissen, M., & Schweitzer, P. (2010). Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent. In Proceedings of GameSec 2010 (pp. 245-256). Springer. doi:10.1007/978-3-642-17197-0_17
Peer reviewed

Kordy, B., Mauw, S., Radomirovic, S., & Schweitzer, P. (2010). Foundations of Attack-Defense Trees. In Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (pp. 80-95). Springer.
Peer reviewed

Kordy, B. (2009). A Rewrite Approach for Pattern Containment. In 19th International Workshop on Algebraic Development Techniques, WADT 2008 (pp. 236-250). Springer.
Peer reviewed

Contact ORBilu