ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
12
views
18
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,587
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
ICT Systems Security and Privacy Protection
Attack Trees with Sequential Conjunction
other
Author(s):
Ravi Jhawar
,
Barbara Kordy
,
Sjouke Mauw
,
Saša Radomirović
,
Rolando Trujillo-Rasua
Publication date
(Online):
May 9 2015
Publisher:
Springer International Publishing
Read this book at
Publisher
Further versions
open (via free pdf)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
18
Record
: found
Abstract
: not found
Article
: not found
DAG-based attack and defense modeling: Don’t miss the forest for the attack trees
Barbara Kordy
,
Ludovic Piètre-Cambacédès
,
Patrick Schweitzer
(2014)
0
comments
Cited
28
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Foundations of Attack Trees
Sjouke Mauw
,
Martijn Oostdijk
(2006)
0
comments
Cited
27
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
The equational theory of pomsets
Jay Gischer
(1988)
0
comments
Cited
26
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2015
Publication date (Online):
May 9 2015
Pages
: 339-353
DOI:
10.1007/978-3-319-18467-8_23
SO-VID:
03b6cea4-26f2-4670-9990-7261902cd7f7
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 67
Strategic Noninterference
pp. 252
Automated Classification of C&C Connections Through Malware URL Clustering
pp. 339
Attack Trees with Sequential Conjunction
pp. 557
The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation
pp. 571
On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps
pp. 616
Securing BACnet’s Pitfalls
Similar content
3,587
Laser-Driven Very High Energy Electron/Photon Beam Radiation Therapy in Conjunction with a Robotic System
Authors:
Liming Chen
,
Kazuhisa NAKAJIMA
,
Jianjun Yuan
…
Ozone therapy in conjunction with oral antibiotics as a successful primary and sole treatment for chronic septic prosthetic joint: review and case report
Authors:
Robert Rowen
High-speed alignment optimization of digital optical phase conjugation systems based on autocovariance analysis in conjunction with orthonormal rectangular polynomials
Authors:
Ashton S. Hemphill
,
Yuecheng Shen
,
Jeeseong Hwang
…
See all similar
Cited by
3
On Quantitative Analysis of Attack–Defense Trees with Repeated Labels
Authors:
Barbara Kordy
,
Wojciech Wideł
A Comparative Cost Analysis of Organizational Network Security Test Lab Setup on Cloud Versus Dedicated Virtual Machine
Authors:
Sachin Gupta
,
Bhoomi Gupta
,
Atul Rana
Using Data Integration for Security Testing
Authors:
Sébastien Salva
,
Loukmen Regainia
See all cited by