ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
28
views
0
references
Top references
cited by
8
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,109
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Secrets and Lies: Digital Security in a Networked World
Attack Trees
other
Author(s):
Bruce Schneier
Publication date
(Online):
October 09 2015
Publisher:
Wiley Publishing, Inc.
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Author and book information
Book Chapter
Publication date (Online):
October 09 2015
Pages
: 318-333
DOI:
10.1002/9781119183631.ch21
SO-VID:
abe19bf5-30ee-4950-9871-faaa64b4a963
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 318
Attack Trees
Similar content
1,109
Molecular Signatures in Arabidopsis thaliana in Response to Insect Attack and Bacterial Infection
Authors:
Pankaj Barah
,
Per Winge
,
Anna Kusnierczyk
…
Landscape predictors of wolf attacks on bear-hunting dogs in Wisconsin, USA
Authors:
Erik R. Olson
,
Adrian Treves
,
Adrian Wydeven
…
Prey attack, food preference and growth in juveniles of the edible muricid snail, Chorus giganteus
Authors:
RM Gutierrez
,
CS Gallardo
See all similar
Cited by
7
PF-BTS: A Privacy-Aware Fog-enhanced Blockchain-assisted task scheduling
Authors:
Hamza Baniata
,
Ahmad T. Anaqreh
,
Attila Kertész
Risk management-based security evaluation model for telemedicine systems
Authors:
Dong-won Kim
,
Jin-young Choi
,
Keun-hee Han
False Data Detection for Fog and Internet of Things Networks
Authors:
Romano Fantacci
,
Francesca Nizzi
,
Tommaso Pecorella
…
See all cited by