... | ... | @@ -14,18 +14,22 @@ |
|
|
|
|
|
# Papers
|
|
|
|
|
|
- Patrick Schweitzer. Attack–Defense Trees. PhD Thesis. 2013. http://satoss.uni.lu/members/phd-theses/pschweitzer13-thesis.pdf
|
|
|
|
|
|
- Kordy, B., S. Mauw, S. Radomirovic, and P. Schweitzer. “Attack-Defense Trees.” Journal of Logic and Computation 24, no. 1 (February 1, 2014): 55–87. https://doi.org/10.1093/logcom/exs029.
|
|
|
|
|
|
- Kordy, Barbara, Piotr Kordy, Sjouke Mauw, and Patrick Schweitzer. “ADTool: Security Analysis with Attack–Defense Trees.” In Quantitative Evaluation of Systems, edited by Kaustubh Joshi, Markus Siegle, Mariëlle Stoelinga, and Pedro R. D’Argenio, 8054:173–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. https://doi.org/10.1007/978-3-642-40196-1_15.
|
|
|
|
|
|
- Kumar, Rajesh, Stefano Schivo, Enno Ruijters, Buǧra Mehmet Yildiz, David Huistra, Jacco Brandt, Arend Rensink, and Mariëlle Stoelinga. “Effective Analysis of Attack Trees: A Model-Driven Approach.” In Fundamental Approaches to Software Engineering, edited by Alessandra Russo and Andy Schürr, 10802:56–73. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-89363-1_4.
|
|
|
|
|
|
- Schivo, Stefano, Buğra M. Yildiz, Enno Ruijters, Christopher Gerking, Rajesh Kumar, Stefan Dziwok, Arend Rensink, and Mariëlle Stoelinga. “How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach.” In Dependable Software Engineering. Theories, Tools, and Applications, edited by Kim Guldstrand Larsen, Oleg Sokolsky, and Ji Wang, 10606:319–36. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-69483-2_19.
|
|
|
|
|
|
- Kumar, Rajesh, Enno Ruijters, and Mariëlle Stoelinga. “Quantitative Attack Tree Analysis via Priced Timed Automata.” In Formal Modeling and Analysis of Timed Systems, edited by Sriram Sankaranarayanan and Enrico Vicario, 9268:156–71. Cham: Springer International Publishing, 2015. https://doi.org/10.1007/978-3-319-22975-1_11.
|
|
|
|
|
|
- Gadyatskaya, Olga, René Rydhof Hansen, Kim Guldstrand Larsen, Axel Legay, Mads Chr. Olesen, and Danny Bøgsted Poulsen. “Modelling Attack-Defense Trees Using Timed Automata.” In Formal Modeling and Analysis of Timed Systems, edited by Martin Fränzle and Nicolas Markey, 9884:35–50. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-44878-7_3.
|
|
|
|
|
|
- Patrick Schweitzer. Attack–Defense Trees. PhD Thesis. 2013. http://satoss.uni.lu/members/phd-theses/pschweitzer13-thesis.pdf
|
|
|
|
|
|
- Wolters, Niels. Quantitative analysis of attack trees with timed automata. Master Thesis. https://fmt.ewi.utwente.nl/media/194_attachment_1.pdf
|
|
|
|
|
|
- Kordy, Barbara, Piotr Kordy, Sjouke Mauw, and Patrick Schweitzer. “ADTool: Security Analysis with Attack–Defense Trees.” In Quantitative Evaluation of Systems, edited by Kaustubh Joshi, Markus Siegle, Mariëlle Stoelinga, and Pedro R. D’Argenio, 8054:173–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. https://doi.org/10.1007/978-3-642-40196-1_15.
|
|
|
|
|
|
## Model-Based Development
|
|
|
|
|
|
- Rodrigues da Silva, “Model-Driven Engineering: A Survey Supported by the Unified Conceptual Model.”
|
... | ... | |