Modeling Attack-Defense Trees’ Countermeasures Using Continuous Time Markov Chains
- 17 January 2021
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Attacks and Defenses in Short-Range Wireless Technologies for IoTIEEE Access, 2020
- Bluetooth Low Energy Makes “Just Works” Not WorkPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2019
- Connection Dumping Vulnerability Affecting Bluetooth AvailabilityPublished by Springer Science and Business Media LLC ,2019
- Semi-automatically Augmenting Attack Trees Using an Annotated Attack Tree LibraryPublished by Springer Science and Business Media LLC ,2018
- Ensuring the Functional Correctness of IoT through Formal Modeling and VerificationPublished by Springer Science and Business Media LLC ,2018
- Stochastic-based Semantics Of Attack-Defense Trees For Security AssessmentElectronic Notes in Theoretical Computer Science, 2018
- A Stochastic Framework for Quantitative Analysis of Attack-Defense TreesPublished by Springer Science and Business Media LLC ,2016
- Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0Published by Springer Science and Business Media LLC ,2016
- Generating attacks in SysML activity diagrams by detecting attack surfacesJournal of Ambient Intelligence and Humanized Computing, 2015
- Foundations of Attack–Defense TreesLecture Notes in Computer Science, 2011