, ADT2AMAS

R. Alur, T. Henzinger, and M. Vardi, Parametric real-time reasoning, ACM Symposium on Theory of Computing, pp.592-601, 1993.

,

É. André, L. Fribourg, U. Kühne, and R. Soulat, IMITATOR 2.5: A tool for analyzing robustness in scheduling problems, FM 2012, vol.7436, pp.33-36, 2012.

É. André, D. Lime, M. Ramparison, and M. Stoelinga, Parametric analyses of attack-fault trees, ACSD 2019, pp.33-42, 2019.

,

F. Arnold, D. Guck, R. Kumar, and M. Stoelinga, Sequential and parallel attack tree modelling, SAFECOMP. pp, pp.291-299, 2015.

Z. Aslanyan and F. Nielson, Pareto Efficient Solutions of Attack-Defence Trees, Principles of Security and Trust, vol.9036, pp.95-114, 2015.

Z. Aslanyan, F. Nielson, and D. Parker, Quantitative Verification and Synthesis of Attack-Defence Scenarios, CSF 2016, pp.105-119, 2016.

A. Buldas, P. Laud, J. Priisalu, M. Saarepera, and J. Willemson, Rational Choice of Security Measures Via Multi-parameter Attack Trees, Critical Information Infrastructures Security, pp.235-248, 2006.

A. David, K. Larsen, A. Legay, M. Miku?ionis, and D. Poulsen, Uppaal SMC tutorial, STTT, vol.17, issue.4, pp.397-415, 2015.

R. Fagin, J. Halpern, Y. Moses, and M. Vardi, Reasoning about Knowledge, 1995.

B. Fila and W. Widel, Efficient attack-defense tree analysis using Pareto attribute domains, CSF 2019, pp.200-215, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02308407

,

O. Gadyatskaya, R. Hansen, K. Larsen, A. Legay, M. Olesen et al., Modelling Attack-defense Trees Using Timed Automata, FORMATS 2016, vol.9884, pp.35-50, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01406706

M. Gribaudo, M. Iacono, and S. Marrone, Exploiting Bayesian networks for the analysis of combined attack trees, ENTCS, vol.310, pp.91-111, 2015.

,

H. Hermanns, J. Krämer, J. Kr?ál, and M. Stoelinga, The Value of Attack-Defence Diagrams, POST 2016, vol.9635, pp.163-185, 2016.

W. Jamroga, W. Penczek, P. Dembinski, and A. Mazurkiewicz, Towards partial order reductions for strategic ability, AAMAS 2018, pp.156-165, 2018.

R. Jhawar, B. Kordy, S. Mauw, S. Radomirovi?, and R. Trujillo-rasua, Attack trees with sequential conjunction, ICT Systems Security and Privacy Protection, pp.339-353, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01197256

A. Jürgenson and J. Willemson, Computing Exact Outcomes of Multi-parameter Attack Trees, OTM 2008, pp.1036-1051, 2008.

P. Khand, System level security modeling using attack trees, 2nd International Conference on Computer, Control and Communication, pp.1-6, 2009.

M. Knapik, W. Penczek, L. Petrucci, and T. Sidoruk, Squeezing state spaces of (Attack-Defence) trees, ICECCS 2019, 2019.

B. Kordy, S. Mauw, S. Radomirovi?, and P. Schweitzer, Attackdefense trees, Journal of Logic and Computation, vol.24, issue.1, pp.55-87, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01825088

,

B. Kordy, L. Piètre-cambacédès, and P. Schweitzer, DAG-based attack and defense modeling: Don't miss the forest for the attack trees, Computer Science Review, pp.1-38, 2014.

R. Kumar, E. Ruijters, and M. Stoelinga, Quantitative attack tree analysis via priced timed automata, FORMATS. LNCS, vol.9268, pp.156-171, 2015.

R. Kumar, S. Schivo, E. Ruijters, B. Yildiz, D. Huistra et al., Effective analysis of attack trees: A model-driven approach, Fundamental Approaches to Software Engineering, pp.56-73, 2018.

R. Kumar and M. Stoelinga, Quantitative security and safety analysis with attackfault trees, pp.25-32, 2017.

A. Lomuscio, W. Penczek, and H. Qu, Partial order reductions for model checking temporal epistemic logics over interleaved multi-agent systems, AAMAS 2010, vol.1, pp.659-666, 2010.

O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing, Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.273-284, 2002.

J. Weiss, A system security engineering process, Proceedings of the 14th National Computer Security Conference, pp.572-581, 1991.

W. Widel, M. Audinot, B. Fila, and S. Pinchinat, Beyond 2014: Formal methods for attack tree-based security modeling, ACM Comp. Surv, vol.52, issue.4, p.36, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02308427