Towards a structured unified process for software security, Proceedings of the 2006 international workshop on Software engineering for secure systems , SESS '06, pp.3-10, 2006. ,
DOI : 10.1145/1137627.1137630
Time-Dependent Analysis of Attacks, POST'14, pp.285-305, 2014. ,
DOI : 10.1007/978-3-642-54792-8_16
Modeling Software VulnerabilitiesWith Vulnerability Cause Graphs, 2006 22nd IEEE International Conference on Software Maintenance, pp.411-422, 2006. ,
DOI : 10.1109/ICSM.2006.40
Modeling and detection of complex attacks, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, pp.234-243, 2007. ,
DOI : 10.1109/SECCOM.2007.4550338
The equational theory of pomsets, Theoretical Computer Science, vol.61, issue.2-3, pp.199-224, 1988. ,
DOI : 10.1016/0304-3975(88)90124-7
Attack Trees with Sequential Conjunction, 2015. ,
DOI : 10.1007/978-3-319-18467-8_23
URL : https://hal.archives-ouvertes.fr/hal-01197256
System level security modeling using attack trees, 2009 2nd International Conference on Computer, Control and Communication, pp.1-6, 2009. ,
DOI : 10.1109/IC4.2009.4909245
ADTool: Security Analysis with Attack???Defense Trees, QEST'13, pp.173-176, 2013. ,
DOI : 10.1007/978-3-642-40196-1_15
Attack-defense trees, Journal of Logic and Computation, vol.24, issue.1, pp.55-87, 2014. ,
DOI : 10.1093/logcom/exs029
DAG-based attack and defense modeling: Don???t miss the forest for the attack trees, Computer Science Review, vol.13, issue.14, pp.13-14, 2014. ,
DOI : 10.1016/j.cosrev.2014.07.001
Computational Aspects of Attack???Defense Trees, S&IIS'11, pp.103-116, 2011. ,
DOI : 10.1007/978-3-540-72665-4_40
A Probabilistic Framework for Security Scenarios with Dependent Actions, iFM'14, 2014. ,
DOI : 10.1007/978-3-319-10181-1_16
URL : https://hal.archives-ouvertes.fr/hal-01093276
Foundations of Attack Trees, ICISC'05, pp.186-198, 2006. ,
DOI : 10.1007/11734727_17
Security Goal Indicator Trees: A Model of Software Features that Supports Efficient Security Inspection, 2008 11th IEEE High Assurance Systems Engineering Symposium, pp.9-18, 2008. ,
DOI : 10.1109/HASE.2008.57
Beyond Attack Trees: Dynamic Security Modeling with Boolean Logic Driven Markov Processes (BDMP), 2010 European Dependable Computing Conference, pp.199-208, 2010. ,
DOI : 10.1109/EDCC.2010.32
Towards Synthesis of Attack Trees for Supporting Computer-Aided Risk Analysis, Software Engineering and Formal Methods, pp.363-375, 2014. ,
DOI : 10.1007/978-3-319-15201-1_24
URL : https://hal.archives-ouvertes.fr/hal-01064645
Attack plan recognition and prediction using causal networks, 20th Annual Computer Security Applications Conference, pp.370-379, 2004. ,
Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees, Security and Communication Networks, vol.1, issue.1, pp.929-943, 2012. ,
DOI : 10.1002/sec.299
Attack Trees, Journal of Software Tools, vol.24, issue.12, pp.21-29, 1999. ,
DOI : 10.1002/9781119183631.ch21
Unified Parametrizable Attack Tree, International Journal for Information Security Research, vol.1, issue.1, pp.20-26, 2011. ,
DOI : 10.20533/ijisr.2042.4639.2011.0003
Space Based Information System Security Risk Evaluation Based on Improved Attack Trees, pp.480-483, 2011. ,
Serial Model for Attack Tree Computations, ICISC'09, pp.118-128, 2010. ,