Foundations of Attack Trees

作者: Sjouke Mauw , Martijn Oostdijk

DOI: 10.1007/11734727_17

关键词:

摘要: … In [12] attack trees are compared to attack nets (a threat … of security knowledge between collaborators. As far as collaborative attack modeling is concerned, the authors prefer attack nets …

参考文章(13)
Terese, Term Rewriting Systems ,(2003)
D. F. Haasl, N. H. Roberts, F. F. Goldberg, W. E. Vesely, Fault Tree Handbook ,(1987)
J. P. McDermott, Attack net penetration testing new security paradigms workshop. pp. 15- 21 ,(2001) , 10.1145/366173.366183
Jan Steffan, Markus Schumacher, Collaborative attack modeling acm symposium on applied computing. pp. 253- 259 ,(2002) , 10.1145/508791.508843
Cynthia Phillips, Laura Painton Swiler, None, A graph-based system for network-vulnerability analysis new security paradigms workshop. pp. 71- 79 ,(1998) , 10.1145/310889.310919
L.P. Swiler, C. Phillips, D. Ellis, S. Chakerian, Computer-attack graph generation tool darpa information survivability conference and exposition. ,vol. 2, pp. 307- 321 ,(2001) , 10.1109/DISCEX.2001.932182
Marvin Rausand, Stefán Einarsson, An Approach to Vulnerability Analysis of Complex Industrial Systems Risk Analysis. ,vol. 18, pp. 535- 546 ,(1998) , 10.1023/B:RIAN.0000005928.84074.E4
Catherine Meadows, Open issues in formal methods for cryptographic protocol analysis darpa information survivability conference and exposition. ,vol. 1, pp. 21- 21 ,(2000) , 10.1007/3-540-45116-1_3
Carl E. Landwehr, Formal Models for Computer Security ACM Computing Surveys. ,vol. 13, pp. 247- 278 ,(1981) , 10.1145/356850.356852