... | ... | @@ -11,6 +11,18 @@ |
|
|
|
|
|
* [Adt2Upp](https://github.com/utwente-fmt/Adt2Upp): Old version of `attop`.
|
|
|
|
|
|
# Papers
|
|
|
|
|
|
- Kordy, B., S. Mauw, S. Radomirovic, and P. Schweitzer. “Attack-Defense Trees.” Journal of Logic and Computation 24, no. 1 (February 1, 2014): 55–87. https://doi.org/10.1093/logcom/exs029.
|
|
|
|
|
|
- Kordy, Barbara, Piotr Kordy, Sjouke Mauw, and Patrick Schweitzer. “ADTool: Security Analysis with Attack–Defense Trees.” In Quantitative Evaluation of Systems, edited by Kaustubh Joshi, Markus Siegle, Mariëlle Stoelinga, and Pedro R. D’Argenio, 8054:173–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. https://doi.org/10.1007/978-3-642-40196-1_15.
|
|
|
|
|
|
- Kumar, Rajesh, Stefano Schivo, Enno Ruijters, Buǧra Mehmet Yildiz, David Huistra, Jacco Brandt, Arend Rensink, and Mariëlle Stoelinga. “Effective Analysis of Attack Trees: A Model-Driven Approach.” In Fundamental Approaches to Software Engineering, edited by Alessandra Russo and Andy Schürr, 10802:56–73. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-89363-1_4.
|
|
|
|
|
|
- Schivo, Stefano, Buğra M. Yildiz, Enno Ruijters, Christopher Gerking, Rajesh Kumar, Stefan Dziwok, Arend Rensink, and Mariëlle Stoelinga. “How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach.” In Dependable Software Engineering. Theories, Tools, and Applications, edited by Kim Guldstrand Larsen, Oleg Sokolsky, and Ji Wang, 10606:319–36. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-69483-2_19.
|
|
|
|
|
|
- Wolters, Niels. Quantitative analysis of attack trees with timed automata. Master Thesis. https://fmt.ewi.utwente.nl/media/194_attachment_1.pdf
|
|
|
|
|
|
## Model-Based Development
|
|
|
|
|
|
- Rodrigues da Silva, “Model-Driven Engineering: A Survey Supported by the Unified Conceptual Model.”
|
... | ... | @@ -29,17 +41,3 @@ at a high level of abstraction. |
|
|
- Steinberg, Dave, ed. EMF: Eclipse Modeling Framework. 2nd ed., Rev. and updated. The Eclipse Series. Upper Saddle River, NJ: Addison-Wesley, 2009.
|
|
|
|
|
|
- Dimitris Kolovos, Louis Rose, Antonio García-Domínguez, Richard Paige. The Epsilon Book. 2016. http://www.eclipse.org/epsilon/doc/book/ |
|
|
|
|
|
|
|
|
# Papers
|
|
|
|
|
|
- Kordy, B., S. Mauw, S. Radomirovic, and P. Schweitzer. “Attack-Defense Trees.” Journal of Logic and Computation 24, no. 1 (February 1, 2014): 55–87. https://doi.org/10.1093/logcom/exs029.
|
|
|
|
|
|
- Kordy, Barbara, Piotr Kordy, Sjouke Mauw, and Patrick Schweitzer. “ADTool: Security Analysis with Attack–Defense Trees.” In Quantitative Evaluation of Systems, edited by Kaustubh Joshi, Markus Siegle, Mariëlle Stoelinga, and Pedro R. D’Argenio, 8054:173–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. https://doi.org/10.1007/978-3-642-40196-1_15.
|
|
|
|
|
|
- Kumar, Rajesh, Stefano Schivo, Enno Ruijters, Buǧra Mehmet Yildiz, David Huistra, Jacco Brandt, Arend Rensink, and Mariëlle Stoelinga. “Effective Analysis of Attack Trees: A Model-Driven Approach.” In Fundamental Approaches to Software Engineering, edited by Alessandra Russo and Andy Schürr, 10802:56–73. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-89363-1_4.
|
|
|
|
|
|
- Schivo, Stefano, Buğra M. Yildiz, Enno Ruijters, Christopher Gerking, Rajesh Kumar, Stefan Dziwok, Arend Rensink, and Mariëlle Stoelinga. “How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach.” In Dependable Software Engineering. Theories, Tools, and Applications, edited by Kim Guldstrand Larsen, Oleg Sokolsky, and Ji Wang, 10606:319–36. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-69483-2_19.
|
|
|
|
|
|
- Wolters, Niels. Quantitative analysis of attack trees with timed automata. Master Thesis. https://fmt.ewi.utwente.nl/media/194_attachment_1.pdf
|
|
|
|