Commit 1a67960d authored by Jaime Arias's avatar Jaime Arias
Browse files

add ICFEM paper

parent 4f05bae0
......@@ -96,7 +96,7 @@ ADTree adds defence nodes on top of the attack trees used in [4].
![last Assignment](results/last/assignment/last_scheduling_1.png)
### Toy Example
### Example from [5]
#### ADTree model
......@@ -187,3 +187,7 @@ Rensink, and M. Stoelinga. Effective analysis of attack trees: A model-driven
approach. In Fundamental Approaches to Software Engineering, pages 56–73.
Springer, 2018.
[5] J. Arias, C. E. Budde, W. Penczek, L. Petrucci, T. Sidoruk, and M.
Stoelinga. Hackers vs. Security: Attack-Defence Trees as Asynchronous
Multi-agent Systems. In Formal Methods and Software Engineering, vol. 12531,
pages 3-19. Springer, 2020.
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment