Automata for modeling real-time systems, Lecture Notes in Computer Science, vol.443, pp.322-335, 1990. ,
DOI : 10.1007/BFb0032042
Pareto Efficient Solutions of Attack-Defence Trees, Principles of Security and Trust, pp.9510-1007, 2015. ,
DOI : 10.1007/978-3-662-46666-7_6
URL : http://orbit.dtu.dk/en/publications/pareto-efficient-solutions-of-attackdefence-trees(351165da-3d91-4ea8-9131-7aa0962b34ba).html
Quantitative Verification and Synthesis of Attack-Defence Scenarios, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.105-119, 2016. ,
DOI : 10.1109/CSF.2016.15
URL : http://orbit.dtu.dk/files/127221557/2016_QuantitativeVerificationAndSynthesisOfAttackDefenceScenarios.pdf
Attribute Decoration of Attack???Defense Trees, International Journal of Secure Software Engineering, vol.3, issue.2, p.2012 ,
DOI : 10.4018/jsse.2012040101
URL : http://satoss.uni.lu/members/barbara/papers/IJSSE12.pdf
UPPAAL- SMC: statistical model checking for priced timed automata, Proceedings 10th Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL 2012, pp.31-32, 2012. ,
Timed I/O automata, Proceedings of the 13th ACM international conference on Hybrid systems: computation and control, HSCC '10, pp.91-100, 2010. ,
DOI : 10.1145/1755952.1755967
Statistical Model Checking for Networks of Priced Timed Automata, FORMATS, pp.80-96, 2011. ,
DOI : 10.1145/1755952.1755987
Modelling attackdefense trees using timed automata, Formal Modeling and Analysis of Timed Systems -14th International Conference, FORMATS 2016 Proceedings, volume 9884 of Lecture Notes in Computer Science, pp.35-50, 2016. ,
DOI : 10.1007/978-3-319-44878-7_3
URL : https://hal.archives-ouvertes.fr/hal-01406706
The Value of Attack-Defence Diagrams, Principles of Security and Trust, pp.163-185, 2016. ,
DOI : 10.1109/TPDS.2013.211
Attack-defense trees, Journal of Logic and Computation, vol.24, issue.1, pp.55-87, 2014. ,
DOI : 10.1093/logcom/exs029
DAG-based attack and defense modeling: Don???t miss the forest for the attack trees, Computer Science Review, vol.13, issue.14, pp.13-141, 2014. ,
DOI : 10.1016/j.cosrev.2014.07.001
Foundations of Attack Trees, Proceedings of the International Conference on Information Security and Cryptology (ICISC 2005), pp.186-198, 2005. ,
DOI : 10.1109/DISCEX.2001.932182
URL : http://www.win.tue.nl/~sjouke/publications/papers/attacktrees.pdf
Design and Analysis of Experiments, 2006. ,
Attack Trees, Dr. Dobb's Journal, 1999. ,
DOI : 10.1002/9781119183631.ch21