Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

5 results
Keywords : Attack trees
Image document

Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications

Madeline Cheah , Hoang Nga Nguyen , Jeremy Bryans , Siraj A. Shaikh
11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.113-129, ⟨10.1007/978-3-319-93524-9_7⟩
Conference papers hal-01875515v1
Image document

A Template-Based Method for the Generation of Attack Trees

Jeremy Bryans , Lin Shen Liew , Hoang Nga Nguyen , Giedre Sabaliauskaite , Siraj Shaikh , et al.
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.155-165, ⟨10.1007/978-3-030-41702-4_10⟩
Conference papers hal-03173899v1
Image document

Combining Third Party Components Securely in Automotive Systems

Madeline Cheah , Siraj A. Shaikh , Jeremy Bryans , Hoang Nga Nguyen
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.262-269, ⟨10.1007/978-3-319-45931-8_18⟩
Conference papers hal-01639623v1
Image document

How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function

Wolfgang Boehmer
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.288-304
Conference papers hal-01506570v1
Image document

Towards Analysis of Sophisticated Attacks, with Conditional Probability, Genetic Algorithm and a Crime Function

Wolfgang Boehmer
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.250-256, ⟨10.1007/978-3-319-10975-6_19⟩
Conference papers hal-01404000v1