Automata for modeling real-time systems, Lecture Notes in Computer Science, vol.443, pp.322-335, 1990. ,
DOI : 10.1007/BFb0032042
Sequential and Parallel Attack Tree Modelling, Computer Safety, Reliability, and Security, pp.291-299, 2015. ,
DOI : 10.1007/978-3-319-24249-1_25
Pareto Efficient Solutions of Attack-Defence Trees, Principles of Security and Trust ,
DOI : 10.1007/978-3-662-46666-7_6
Attribute Decoration of Attack???Defense Trees, International Journal of Secure Software Engineering, vol.3, issue.2, p.2012 ,
DOI : 10.4018/jsse.2012040101
A Tutorial on Uppaal, Lecture Notes in Computer Science, vol.3185, pp.200-236, 2004. ,
DOI : 10.1007/978-3-540-30080-9_7
Rational Choice of Security Measures Via Multi-parameter Attack Trees, Critical Information Infrastructures Security, pp.235-248, 2006. ,
DOI : 10.1007/11962977_19
Analyzing Attack Trees using Generalized Stochastic Petri Nets, 2006 IEEE Information Assurance Workshop, pp.116-123, 2006. ,
DOI : 10.1109/IAW.2006.1652085
Statistical Model Checking for Networks of Priced Timed Automata, FORMATS, pp.80-96, 2011. ,
DOI : 10.1145/1755952.1755987
On Time with Minimal Expected Cost!, Automated Technology for Verification and Analysis, pp.129-145, 2014. ,
DOI : 10.1007/978-3-319-11936-6_10
Uppaal Stratego, Lecture Notes in Computer Science, vol.9035, pp.206-211, 2015. ,
DOI : 10.1007/978-3-662-46681-0_16
How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems, Proc. of GraMSec, 2015. ,
DOI : 10.1007/978-3-319-29968-6_4
URL : http://arxiv.org/abs/1509.00643
The value of attackdefence diagrams, Principles of Security and Trust, pp.163-185, 2016. ,
Transforming Graphical System Models to Graphical Attack Models, Proc. of GraMSec, 2015. ,
DOI : 10.1007/978-3-319-29968-6_6
URL : http://doc.utwente.nl/97647/7/chp_10.1007_978-3-319-29968-6_6.pdf
Computing exact outcomes of multiparameter attack trees, On the Move to Meaningful Internet Systems: OTM 2008, pp.1036-1051, 2008. ,
Attack-defense trees, Journal of Logic and Computation, vol.24, issue.1, pp.55-87, 2014. ,
DOI : 10.1093/logcom/exs029
URL : http://logcom.oxfordjournals.org/cgi/content/short/exs029v1
DAG-based attack and defense modeling: Don???t miss the forest for the attack trees, Computer Science Review, vol.13, issue.14, pp.13-141, 2014. ,
DOI : 10.1016/j.cosrev.2014.07.001
Quantitative Attack Tree Analysis via Priced Timed Automata, Formal Modeling and Analysis of Timed Systems, pp.156-171, 2015. ,
DOI : 10.1007/978-3-319-22975-1_11
URL : http://doc.utwente.nl/97025/1/chp_10.1007_978-3-319-22975-1_11%281%29.pdf
Uppaal in a nutshell, International Journal on Software Tools for Technology Transfer, vol.1, issue.1-2, pp.134-15210, 1997. ,
DOI : 10.1007/s100090050010
Foundations of Attack Trees, Proceedings of the International Conference on Information Security and Cryptology (ICISC 2005), pp.186-198, 2005. ,
DOI : 10.1007/11734727_17
Quantitative verification and synthesis of attack-defense scenarios ,
Toward a secure system engineering methodology, Proceedings of the 1998 New Security Paradigms Workshop (NSPW'98), pp.2-10, 1998. ,
DOI : 10.1145/310889.310900
Attack Trees, 1999. ,
DOI : 10.1002/9781119183631.ch21