default search action
3rd GraMSec@CSF 2016: Lisbon, Portugal
- Barbara Kordy, Mathias Ekstedt, Dong Seong Kim:
Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9987, Springer 2016, ISBN 978-3-319-46262-2 - Xinming Ou:
A Bottom-Up Approach to Applying Graphical Models in Security Analysis. 1-24 - Maxime Audinot, Sophie Pinchinat:
On the Soundness of Attack Trees. 25-38 - Xinshu Dong, Sumeet Jauhar, William G. Temple, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders, Nils Ole Tippenhauer, David M. Nicol:
The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment. 39-61 - Marlon Dumas, Luciano García-Bañuelos, Peeter Laud:
Differential Privacy Analysis of Data Processing Workflows. 62-79 - Olga Gadyatskaya, Carlo Harpes, Sjouke Mauw, Cédric Muller, Steve Muller:
Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees. 80-93 - Henk Jonkers, Dick A. C. Quartel:
Enterprise Architecture-Based Risk and Security Modelling and Analysis. 94-101 - Eric Li, Jeroen Barendse, Frederic Brodbeck, Axel Tanner:
From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation. 102-118 - Nihal Pekergin, Sovanna Tan, Jean-Michel Fourneau:
Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis. 119-133 - Ricardo J. Rodríguez, Xiaolin Chang, Xiaodan Li, Kishor S. Trivedi:
Survivability Analysis of a Computer System Under an Advanced Persistent Threat Attack. 134-149 - Paul D. Rowe:
Confining Adversary Actions via Measurement. 150-166
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.