Attribute Decoration of Attack???Defense Trees, International Journal of Secure Software Engineering, vol.3, issue.2, pp.1-35, 2012. ,
DOI : 10.4018/jsse.2012040101
URL : http://satoss.uni.lu/members/barbara/papers/IJSSE12.pdf
The use of attack trees in assessing vulnerabilities in SCADA systems, Proc. of the Int. Infrastructure Survivability Workshop, 2004. ,
Security Assessment via Attack Tree Model, Security Assessment in Vehicular Networks, pp.9-16, 2013. ,
DOI : 10.1007/978-1-4614-9357-0_2
The Use of Attack and Protection Trees to Analyze Security for an Online Banking System, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07) ,
DOI : 10.1109/HICSS.2007.558
Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0, Proc. of QEST, 2016. ,
DOI : 10.1007/11856214_7
DARPA Information Assurance Program dynamic defense experiment summary, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol.31, issue.4, pp.331-336, 2001. ,
DOI : 10.1109/3468.935052
Attack-defense trees, Journal of Logic and Computation, vol.24, issue.1, pp.55-87, 2014. ,
DOI : 10.1093/logcom/exs029
DAG-based attack and defense modeling: Don???t miss the forest for the attack trees, Computer Science Review, vol.13, issue.14, 2014. ,
DOI : 10.1016/j.cosrev.2014.07.001
URL : http://arxiv.org/pdf/1303.7397.pdf
Quantitative Attack Tree Analysis via Priced Timed Automata, FORMATS, pp.156-171 ,
DOI : 10.1007/978-3-319-22975-1_11
Analyzing Attack Strategies Through Anti-goal Refinement, Proc. of PoEM, pp.75-90, 2015. ,
DOI : 10.1007/978-3-319-25897-3_6
URL : https://hal.archives-ouvertes.fr/hal-01442299
Foundations of Attack Trees, Proc. of ICISC'05, pp.186-198, 2006. ,
DOI : 10.1109/DISCEX.2001.932182
URL : http://www.win.tue.nl/~sjouke/publications/papers/attacktrees.pdf
Generating attack scenarios for the system security validation, Networking Science, vol.24, issue.12, pp.3-469, 2013. ,
DOI : 10.1109/TIT.1983.1056650
URL : https://hal.archives-ouvertes.fr/hal-00848049
Experimental comparison of attack trees and misuse cases for security threat identification, Information and Software Technology, vol.51, issue.5, pp.916-932, 2009. ,
DOI : 10.1016/j.infsof.2008.05.013
Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study, Proc. of GraMSec, pp.31-46, 2014. ,
DOI : 10.1109/JSYST.2012.2221933
Using Attack Trees to Identify Malicious Attacks from Authorized Insiders, Proc. of ESORICS, pp.231-246, 2005. ,
DOI : 10.1007/11555827_14
Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees, Security and Communication Networks, vol.1, issue.1, pp.929-943, 2012. ,
DOI : 10.1002/sec.299
Threat modeling using attack trees, J. of Computing Sciences in Colleges, vol.23, issue.4, pp.124-131, 2008. ,
Attack Trees. Dr. Dobb's Journal of Software Tools, pp.21-29, 1999. ,