12
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      ICT Systems Security and Privacy Protection 

      Attack Trees with Sequential Conjunction

      other

      Read this book at

      Publisher
      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references18

          • Record: found
          • Abstract: not found
          • Article: not found

          DAG-based attack and defense modeling: Don’t miss the forest for the attack trees

            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Foundations of Attack Trees

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              The equational theory of pomsets

                Bookmark

                Author and book information

                Book Chapter
                2015
                May 9 2015
                : 339-353
                10.1007/978-3-319-18467-8_23
                03b6cea4-26f2-4670-9990-7261902cd7f7
                History

                Comments

                Comment on this book

                Book chapters

                Similar content3,587

                Cited by3