A Comparative Study of Software Security Pattern Classifications, 2012 Seventh International Conference on Availability, Reliability and Security, pp.582-589, 2012. ,
DOI : 10.1109/ARES.2012.43
Attack Trees with Sequential Conjunction, IFIP International Information Security Conference, pp.339-353, 2015. ,
DOI : 10.1007/978-3-319-18467-8_23
URL : https://hal.archives-ouvertes.fr/hal-01197256
Attack-defense trees, Journal of Logic and Computation, vol.24, issue.1, p.29, 2012. ,
DOI : 10.1093/logcom/exs029
A threat model-based approach to security testing, Software: Practice and Experience, vol.3, issue.2, pp.241-258, 2013. ,
DOI : 10.1109/MSP.2005.55
Security test generation using threat trees, 2009 ICSE Workshop on Automation of Software Test, pp.62-69, 2009. ,
DOI : 10.1109/IWAST.2009.5069042
Security Protocol Testing Using Attack Trees, 2009 International Conference on Computational Science and Engineering, pp.690-697, 2009. ,
DOI : 10.1109/CSE.2009.206
A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation, Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017. ,
DOI : 10.5220/0006198301360146
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications, 2003. ,
DOI : 10.1007/b11930
An advanced approach for modeling and detecting software vulnerabilities, Information and Software Technology, vol.54, issue.9, pp.997-1013, 2012. ,
DOI : 10.1016/j.infsof.2012.03.004
URL : https://hal.archives-ouvertes.fr/hal-00739075
Verifying Implementation of Security Design Patterns Using a Test Template, 2014 Ninth International Conference on Availability, Reliability and Security, pp.178-183, 2014. ,
DOI : 10.1109/ARES.2014.31
A system of security patterns, 2006. ,
Do Security Patterns Really Help Designers?, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, pp.292-302, 2015. ,
DOI : 10.1109/ICSE.2015.49