Blog
About

3
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      ICT Systems Security and Privacy Protection 

      Attack Trees with Sequential Conjunction

      Read this book at

      Publisher
      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references 18

          • Record: found
          • Abstract: not found
          • Article: not found

          The equational theory of pomsets

           Jay Gischer (1988)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            DAG-based attack and defense modeling: Don’t miss the forest for the attack trees

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees

                Bookmark

                Author and book information

                Book
                978-3-319-18466-1
                978-3-319-18467-8
                2015
                10.1007/978-3-319-18467-8
                Book Chapter
                2015
                May 9 2015
                : 339-353
                10.1007/978-3-319-18467-8_23

                Comments

                Comment on this book

                Book chapters

                Similar content 3,556

                Cited by 2