Profil

SCHWEITZER Patrick

Main Referenced Co-authors
KORDY, Barbara  (9)
MAUW, Sjouke  (6)
MULLER, Tim  (2)
POULY, Marc  (2)
RADOMIROVIC, Sasa  (2)
Main Referenced Keywords
Attack-Defense Trees (7); Attack Trees (6); Graphical Security Modeling (4); Attributes (3); Asymmetric information (1);
Main Referenced Disciplines
Computer science (12)
Mathematics (2)
Special economic topics (health, labor, transportation...) (1)

Publications (total 15)

The most downloaded
1 downloads
Kordy, B., Mauw, S., Radomirovic, S., & Schweitzer, P. (2012). Attack-Defense Trees. Journal of Logic and Computation. doi:10.1093/logcom/exs029 https://hdl.handle.net/10993/11472

The most cited

167 citations (Scopus®)

Kordy, B., Mauw, S., Radomirovic, S., & Schweitzer, P. (2010). Foundations of Attack-Defense Trees. In Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (pp. 80-95). Springer. https://hdl.handle.net/10993/11461

McKay, B., Schweitzer, P., & Schweitzer, P. (In press). Competition Numbers, Quasi-Line Graphs and Holes. SIAM Journal on Discrete Mathematics. doi:10.1137/110856277
Peer reviewed

Kordy, B., Schweitzer, P., & Pouly, M. (2014). A Probabilistic Framework for Security Scenarios with Dependent Actions. In The 11th International Conference on Integrated Formal Methods (iFM'14), Bertinoro, Italy.
Peer reviewed

Schweitzer, P. (2013). Attack-defense trees [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/16433

Muller, T., & Schweitzer, P. (2013). On Beta Models with Trust Chains. In Proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management (pp. 49-65). Springer.
Peer reviewed

Kordy, B., Kordy, P., Mauw, S., & Schweitzer, P. (2013). ADTool: Security Analysis with Attack-Defense Trees (Tool Demonstration Paper). In 10th International Conference on Quantitative Evaluation of SysTems (pp. 173-176). Springer.
Peer reviewed

Kordy, B., Mauw, S., Radomirovic, S., & Schweitzer, P. (2012). Attack-Defense Trees. Journal of Logic and Computation. doi:10.1093/logcom/exs029
Peer reviewed

Kordy, B., Mauw, S., & Schweitzer, P. (2012). Quantitative Questions on Attack-Defense Trees. In Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers (pp. 49-64). Springer.
Peer reviewed

Kordy, B., Mauw, S., & Schweitzer, P. (2012). Quantitative Questions on Attack-Defense Trees.

Bagnato, A., Kordy, B., Meland, P. H., & Schweitzer, P. (2012). Attribute Decoration of Attack-Defense Trees. International Journal of Secure Software Engineering, 3 (2), 1-35. doi:10.4018/jsse.2012040101
Peer reviewed

Muller, T., & Schweitzer, P. (2012). A Formal Derivation of Composite Trust. In Foundations and Practice of Security - 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers (pp. 132-148). Springer.
Peer reviewed

Kordy, B., Pouly, M., & Schweitzer, P. (2011). Computational Aspects of Attack-Defense Trees. In Security and Intelligent Information Systems - International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers (pp. 103-116). Springer.
Peer reviewed

Kordy, B., Mauw, S., Melissen, M., & Schweitzer, P. (2010). Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent. In Proceedings of GameSec 2010 (pp. 245-256). Springer. doi:10.1007/978-3-642-17197-0_17
Peer reviewed

Kordy, B., Mauw, S., Radomirovic, S., & Schweitzer, P. (2010). Foundations of Attack-Defense Trees. In Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (pp. 80-95). Springer.
Peer reviewed

Schweitzer, P., & Schweitzer, P. (2010). Connecting face hitting sets in planar graphs. Information Processing Letters, 111 (1), 11-15. doi:10.1016/j.ipl.2010.10.008
Peer Reviewed verified by ORBi

Krysiak, F. C., & Schweitzer, P. (2010). The optimal size of a permit market. Journal of Environmental Economics and Management, 60 (2), 133-143. doi:10.1016/j.jeem.2010.05.001
Peer Reviewed verified by ORBi

Contact ORBilu