Search

Your search keyword '"Kordy, Barbara"' showing total 93 results

Search Constraints

Start Over You searched for: Author "Kordy, Barbara" Remove constraint Author: "Kordy, Barbara"
93 results on '"Kordy, Barbara"'

Search Results

1. Is my attack tree correct? Extended version

2. Attack Trees with Sequential Conjunction

3. Proceedings First International Workshop on Graphical Models for Security

4. ADTool: Security Analysis with Attack-Defense Trees (Extended Version)

5. DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees

6. On Quantitative Analysis of Attack–Defense Trees with Repeated Labels

7. Evil Twins: Handling Repetitions in Attack–Defense Trees : A Survival Guide

8. Quantitative Questions on Attack-Defense Trees

9. Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent - Technical Report with Proofs

10. How Well Can I Secure My System?

11. Is My Attack Tree Correct?

12. How to Handle Rainbow Tables with External Memory

13. SPTool – Equivalence Checker for Attack Trees

15. A Probabilistic Framework for Security Scenarios with Dependent Actions

17. ADTool: Security Analysis with Attack–Defense Trees

18. Quantitative Questions on Attack–Defense Trees

20. Computational Aspects of Attack–Defense Trees

21. Foundations of Attack–Defense Trees

22. Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent

23. A Rewrite Approach for Pattern Containment

31. Enterprise Architecture-Based Risk and Security Modelling and Analysis

32. On Quantitative Analysis of Attack-Defense Trees with Repeated Labels

34. ADTool

35. Graphical Models for Security: Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers

36. SPTool - Equivalence Checker for SAND Attack Trees

37. Graphical Models for Security

38. The Attack Navigator (Invited)

39. Bridging two worlds: Reconciling practical risk assessment methodologies with theory of attack trees

40. From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation

41. Transforming Graphical System Models To Graphical Attack Models

42. Vers un outil de vérification formelle légere pour OCaml

43. Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014

44. A Rewrite Approach for Pattern Containment ��� Application to Query Evaluation on Compressed Documents

48. Attack–defense trees1.

49. SysML-Sec Attack Graphs: Compact Representations for Complex Attacks

50. ATSyRa: An Integrated Environment for Synthesizing Attack Trees : (Tool Paper)

Catalog

Books, media, physical & digital resources