Filter your results
- 4
- 4
- 4
- 1
- 3
- 1
- 4
- 2
- 1
- 1
- 1
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Attack Trees with Sequential Conjunction30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.339-353, ⟨10.1007/978-3-319-18467-8_23⟩
Conference papers
hal-01197256v1
|
||
|
Counteracting Active Attacks in Social Network Graphs30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.233-248, ⟨10.1007/978-3-319-41483-6_17⟩
Conference papers
hal-01633668v1
|
||
|
The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.19-34, ⟨10.1007/978-3-319-41483-6_2⟩
Conference papers
hal-01633679v1
|
||
|
Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study9th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2016, Skövde, Sweden. pp.326-334, ⟨10.1007/978-3-319-48393-1_24⟩
Conference papers
hal-01653513v1
|