Attack tree

Results: 40



#Item
11

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:38:04
122014 IEEE Security and Privacy Workshops  Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon

2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2015-03-18 10:54:32
13Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRSeptember 24, 2009

Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRSeptember 24, 2009

Add to Reading List

Source URL: dspace.mit.edu

Language: English - Date: 2009-09-29 02:01:46
14SESSION ID: ANF-F03  Achieving Defendable Architectures via Threat-Driven Methodologies Michael Muckin

SESSION ID: ANF-F03 Achieving Defendable Architectures via Threat-Driven Methodologies Michael Muckin

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-04-28 14:34:47
15Sybil-resistant DHT routing George Danezis1 , Chris Lesniewski-Laas2, M. Frans Kaashoek2 , and Ross Anderson1 1  2

Sybil-resistant DHT routing George Danezis1 , Chris Lesniewski-Laas2, M. Frans Kaashoek2 , and Ross Anderson1 1 2

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:16
16Attribute Decoration of Attack–Defense Trees Alessandra Bagnato1 , Barbara Kordy2 , Per Håkon Meland3 , Patrick Schweitzer2 1 TXT e-solutions

Attribute Decoration of Attack–Defense Trees Alessandra Bagnato1 , Barbara Kordy2 , Per Håkon Meland3 , Patrick Schweitzer2 1 TXT e-solutions

Add to Reading List

Source URL: satoss.uni.lu

Language: English - Date: 2014-09-17 09:23:54
17Analyzing the Security in the GSM Radio Network using Attack Jungles Parosh Aziz Abdulla1 , Jonathan Cederberg1 , and Lisa Kaati2? 1  University of Uppsala, Sweden, email: {parosh, jonathan.cederberg}@it.uu.se

Analyzing the Security in the GSM Radio Network using Attack Jungles Parosh Aziz Abdulla1 , Jonathan Cederberg1 , and Lisa Kaati2? 1 University of Uppsala, Sweden, email: {parosh, jonathan.cederberg}@it.uu.se

Add to Reading List

Source URL: user.it.uu.se

Language: English - Date: 2011-10-12 02:21:46
18Determining the Probability of Smart Grid Attacks by ∗ Combining Attack Tree and Attack Graph Analysis Kristian Beckers1 , Maritta Heisel1 , Leanid Krautsevich2 , Fabio Martinelli2 , Rene Meis1 , and Artsiom Yautsiukhi

Determining the Probability of Smart Grid Attacks by ∗ Combining Attack Tree and Attack Graph Analysis Kristian Beckers1 , Maritta Heisel1 , Leanid Krautsevich2 , Fabio Martinelli2 , Rene Meis1 , and Artsiom Yautsiukhi

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2015-04-02 07:11:50
19LeastLeast-toxic Control of Elm Leaf Beetles Elm leaf beetles attack all species of elm, but prefer English and American Elms. These beetles feed on tree leaves, mainly causing aesthetic damage. However, this does stress

LeastLeast-toxic Control of Elm Leaf Beetles Elm leaf beetles attack all species of elm, but prefer English and American Elms. These beetles feed on tree leaves, mainly causing aesthetic damage. However, this does stress

Add to Reading List

Source URL: www.beyondpesticides.org

Language: English - Date: 2012-09-07 11:04:53
20Attacks at the Data Link Layer By GUILLERMO MARIO MARRO Electronic Engineer (Universidad Nacional de Rosario[removed]THESIS Submitted in partial satisfaction of the requirements for the degree of

Attacks at the Data Link Layer By GUILLERMO MARIO MARRO Electronic Engineer (Universidad Nacional de Rosario[removed]THESIS Submitted in partial satisfaction of the requirements for the degree of

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:50:00