Towards Distributed Software Model-Checking Using Decision Diagrams, Computer Aided Verification -25th International Conference, CAV 2013, pp.830-845, 2013. ,
DOI : 10.1007/978-3-642-39799-8_58
URL : https://hal.archives-ouvertes.fr/hal-01215999
Scalable Attack Representation Model Using Logic Reduction Techniques, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.404-411, 2013. ,
DOI : 10.1109/TrustCom.2013.51
ADTool: Security Analysis with Attack???Defense Trees, Lecture Notes in Computer Science, vol.8054, pp.173-176, 2013. ,
DOI : 10.1007/978-3-642-40196-1_15
Attack-defense trees, Journal of Logic and Computation, vol.24, issue.1, pp.55-87, 2014. ,
DOI : 10.1093/logcom/exs029
DAG-based attack and defense modeling: Don???t miss the forest for the attack trees, Computer Science Review, vol.13, issue.14, pp.13-14, 2014. ,
DOI : 10.1016/j.cosrev.2014.07.001
Foundations of Attack Trees, International Conference on Information Security and Cryptology -ICISC 2005, pp.186-198, 2006. ,
DOI : 10.1007/11734727_17
Towards Synthesis of Attack Trees for Supporting Computer-Aided Risk Analysis, Revised Selected Papers. Lecture Notes in Computer Science, vol.8938, pp.363-375, 2014. ,
DOI : 10.1007/978-3-319-15201-1_24
URL : https://hal.archives-ouvertes.fr/hal-01064645
Attack Trees, Dr. Dobb's Journal, 1999. ,
DOI : 10.1002/9781119183631.ch21
Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study, Electronic Proceedings in Theoretical Computer Science, vol.148, pp.31-46, 2014. ,
DOI : 10.4204/EPTCS.148.3
Symbolic Model-Checking Using ITS-Tools Tools and Algorithms for the Construction and Analysis of Systems, 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, pp.231-237, 2015. ,
Automated Generation of Attack Trees, 2014 IEEE 27th Computer Security Foundations Symposium, pp.337-350, 2014. ,
DOI : 10.1109/CSF.2014.31