Search dblp for Publications

export results for "Foundations of Attack Trees."

 download as .bib file

@inproceedings{DBLP:conf/ifip1-7/KordyMRS10,
  author       = {Barbara Kordy and
                  Sjouke Mauw and
                  Sasa Radomirovic and
                  Patrick Schweitzer},
  title        = {Foundations of Attack-Defense Trees},
  booktitle    = {Formal Aspects of Security and Trust - 7th International Workshop,
                  {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected
                  Papers},
  pages        = {80--95},
  year         = {2010},
  crossref     = {DBLP:conf/ifip1-7/2010},
  url          = {https://doi.org/10.1007/978-3-642-19751-2\_6},
  doi          = {10.1007/978-3-642-19751-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/KordyMRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MauwO05,
  author       = {Sjouke Mauw and
                  Martijn Oostdijk},
  title        = {Foundations of Attack Trees},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  pages        = {186--198},
  year         = {2005},
  crossref     = {DBLP:conf/icisc/2005},
  url          = {https://doi.org/10.1007/11734727\_17},
  doi          = {10.1007/11734727\_17},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MauwO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip1-7/2010,
  editor       = {Pierpaolo Degano and
                  Sandro Etalle and
                  Joshua D. Guttman},
  title        = {Formal Aspects of Security and Trust - 7th International Workshop,
                  {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6561},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19751-2},
  doi          = {10.1007/978-3-642-19751-2},
  isbn         = {978-3-642-19750-5},
  timestamp    = {Mon, 15 Jul 2024 07:30:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2005,
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734727},
  doi          = {10.1007/11734727},
  isbn         = {3-540-33354-1},
  timestamp    = {Mon, 15 Jul 2024 07:30:26 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics