搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Sjouke Mauw , Martijn Oostdijk
DOI: 10.1007/11734727_17
关键词:
摘要: … In [12] attack trees are compared to attack nets (a threat … of security knowledge between collaborators. As far as collaborative attack modeling is concerned, the authors prefer attack nets …
decision and game theory for security,2014, 引用: 5
availability, reliability and security,2013, 引用: 1
A framework for analyzing and mitigating the vulnerabilities of complex systems via attack and protection trees,2007, 引用: 40
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII,2009, 引用: 8
Lecture Notes in Business Information Processing,2012, 引用: 45
decision and game theory for security,2012, 引用: 17
Lecture Notes in Computer Science,2014, 引用: 7
Critical Information Infrastructures Security,2008, 引用: 6
Computers & Electrical Engineering,2011, 引用: 12
principles of security and trust,2014, 引用: 41