ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
29
views
0
references
Top references
cited by
8
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,212
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Secrets and Lies: Digital Security in a Networked World
Attack Trees
other
Author(s):
Bruce Schneier
Publication date
(Online):
October 09 2015
Publisher:
Wiley Publishing, Inc.
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Author and book information
Book Chapter
Publication date (Online):
October 09 2015
Pages
: 318-333
DOI:
10.1002/9781119183631.ch21
SO-VID:
abe19bf5-30ee-4950-9871-faaa64b4a963
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 318
Attack Trees
Similar content
1,212
In-hospital stroke recurrence and stroke after transient ischemic attack: frequency and risk factors.
Authors:
Hebun Erdur
,
Jan F Scheitz
,
Martin Ebinger
…
A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions
Authors:
Ethan Rudd
,
Andras Rozsa
,
Manuel Günther
…
On the Requirements for Successful GPS Spoofing Attacks
Authors:
N.O. Tippenhauer
,
C Popper
,
K.B. Rasmussen
…
See all similar
Cited by
7
PF-BTS: A Privacy-Aware Fog-enhanced Blockchain-assisted task scheduling
Authors:
Hamza Baniata
,
Ahmad T. Anaqreh
,
Attila Kertész
Risk management-based security evaluation model for telemedicine systems
Authors:
Dong-won Kim
,
Jin-young Choi
,
Keun-hee Han
False Data Detection for Fog and Internet of Things Networks
Authors:
Romano Fantacci
,
Francesca Nizzi
,
Tommaso Pecorella
…
See all cited by