, ADT2AMAS
Parametric real-time reasoning, ACM Symposium on Theory of Computing, pp.592-601, 1993. ,
,
IMITATOR 2.5: A tool for analyzing robustness in scheduling problems, FM 2012, vol.7436, pp.33-36, 2012. ,
Parametric analyses of attack-fault trees, ACSD 2019, pp.33-42, 2019. ,
,
Sequential and parallel attack tree modelling, SAFECOMP. pp, pp.291-299, 2015. ,
Pareto Efficient Solutions of Attack-Defence Trees, Principles of Security and Trust, vol.9036, pp.95-114, 2015. ,
Quantitative Verification and Synthesis of Attack-Defence Scenarios, CSF 2016, pp.105-119, 2016. ,
Rational Choice of Security Measures Via Multi-parameter Attack Trees, Critical Information Infrastructures Security, pp.235-248, 2006. ,
Uppaal SMC tutorial, STTT, vol.17, issue.4, pp.397-415, 2015. ,
, Reasoning about Knowledge, 1995.
Efficient attack-defense tree analysis using Pareto attribute domains, CSF 2019, pp.200-215, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02308407
,
Modelling Attack-defense Trees Using Timed Automata, FORMATS 2016, vol.9884, pp.35-50, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01406706
Exploiting Bayesian networks for the analysis of combined attack trees, ENTCS, vol.310, pp.91-111, 2015. ,
,
The Value of Attack-Defence Diagrams, POST 2016, vol.9635, pp.163-185, 2016. ,
Towards partial order reductions for strategic ability, AAMAS 2018, pp.156-165, 2018. ,
Attack trees with sequential conjunction, ICT Systems Security and Privacy Protection, pp.339-353, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01197256
Computing Exact Outcomes of Multi-parameter Attack Trees, OTM 2008, pp.1036-1051, 2008. ,
System level security modeling using attack trees, 2nd International Conference on Computer, Control and Communication, pp.1-6, 2009. ,
Squeezing state spaces of (Attack-Defence) trees, ICECCS 2019, 2019. ,
Attackdefense trees, Journal of Logic and Computation, vol.24, issue.1, pp.55-87, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01825088
,
DAG-based attack and defense modeling: Don't miss the forest for the attack trees, Computer Science Review, pp.1-38, 2014. ,
Quantitative attack tree analysis via priced timed automata, FORMATS. LNCS, vol.9268, pp.156-171, 2015. ,
Effective analysis of attack trees: A model-driven approach, Fundamental Approaches to Software Engineering, pp.56-73, 2018. ,
Quantitative security and safety analysis with attackfault trees, pp.25-32, 2017. ,
Partial order reductions for model checking temporal epistemic logics over interleaved multi-agent systems, AAMAS 2010, vol.1, pp.659-666, 2010. ,
Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.273-284, 2002. ,
A system security engineering process, Proceedings of the 14th National Computer Security Conference, pp.572-581, 1991. ,
Beyond 2014: Formal methods for attack tree-based security modeling, ACM Comp. Surv, vol.52, issue.4, p.36, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02308427