Towards Distributed Software Model-Checking Using Decision Diagrams, Lecture Notes in Computer Science, vol.8044, pp.830-845, 2013. ,
DOI : 10.1007/978-3-642-39799-8_58
URL : https://hal.archives-ouvertes.fr/hal-01215999
Scalable Attack Representation Model Using Logic Reduction Techniques, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.404-411, 2013. ,
DOI : 10.1109/TrustCom.2013.51
Norm ISO/IEC 27002 -Information Technology -Security Techniques -Code of Practice for Information Security Management, IEC 27002:2005 edition, 2005. ,
Two formal analyses of attack graphs, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.49-63, 2002. ,
DOI : 10.1109/CSFW.2002.1021806
Foundations of Attack???Defense Trees, Formal Aspects of Security and Trust, pp.80-95, 2011. ,
DOI : 10.1007/978-3-540-88873-4_8
Attack-defense trees, Journal of Logic and Computation, vol.24, issue.1, pp.55-87, 2014. ,
DOI : 10.1093/logcom/exs029
DAG-based attack and defense modeling: Don???t miss the forest for the attack trees, Computer Science Review, vol.13, issue.14, 2013. ,
DOI : 10.1016/j.cosrev.2014.07.001
Foundations of Attack Trees, International Conference on Information Security and Cryptology -ICISC 2005, pp.186-198, 2005. ,
DOI : 10.1007/11734727_17
Ranking Attack Graphs, Proceedings of Recent Advances in Intrusion Detection, 2006. ,
DOI : 10.1007/11856214_7
RTO) Improving Common Security Risk Analysis, 2008. ,
Attack Trees, Dr. Dobb's Journal, 1999. ,
DOI : 10.1002/9781119183631.ch21
Risks due to convergence of physical security systems and information technology environments, Information Security Technical Report, vol.12, issue.2, pp.80-84, 2007. ,
DOI : 10.1016/j.istr.2007.06.001
http://sourceforge.net/apps/mediawiki/seamonster ,
Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, p.273, 2002. ,
DOI : 10.1109/SECPRI.2002.1004377
Tools for Generating and Analyzing Attack Graphs, Proceedings of Formal Methods for Components and Objects, pp.344-371, 2004. ,
DOI : 10.1109/32.815323
Scenario Graphs and Attack Graphs, 2004. ,